CVE-2011-0048 : Detail

CVE-2011-0048

Cross-site Scripting
A03-Injection
0.39%V3
Network
2011-01-28
14h00 +00:00
2017-08-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Bugzilla before 3.2.10, 3.4.x before 3.4.10, 3.6.x before 3.6.4, and 4.0.x before 4.0rc2 creates a clickable link for a (1) javascript: or (2) data: URI in the URL (aka bug_file_loc) field, which allows remote attackers to conduct cross-site scripting (XSS) attacks against logged-out users via a crafted URI.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Mozilla>>Bugzilla >> Version To (including) 3.2.9

Mozilla>>Bugzilla >> Version 2.0

Mozilla>>Bugzilla >> Version 2.2

Mozilla>>Bugzilla >> Version 2.4

Mozilla>>Bugzilla >> Version 2.6

Mozilla>>Bugzilla >> Version 2.8

Mozilla>>Bugzilla >> Version 2.9

Mozilla>>Bugzilla >> Version 2.10

Mozilla>>Bugzilla >> Version 2.12

Mozilla>>Bugzilla >> Version 2.14

Mozilla>>Bugzilla >> Version 2.14.1

Mozilla>>Bugzilla >> Version 2.14.2

Mozilla>>Bugzilla >> Version 2.14.3

Mozilla>>Bugzilla >> Version 2.14.4

Mozilla>>Bugzilla >> Version 2.14.5

Mozilla>>Bugzilla >> Version 2.16

Mozilla>>Bugzilla >> Version 2.16

Mozilla>>Bugzilla >> Version 2.16

Mozilla>>Bugzilla >> Version 2.16.1

Mozilla>>Bugzilla >> Version 2.16.2

Mozilla>>Bugzilla >> Version 2.16.3

Mozilla>>Bugzilla >> Version 2.16.4

Mozilla>>Bugzilla >> Version 2.16.5

Mozilla>>Bugzilla >> Version 2.16.6

Mozilla>>Bugzilla >> Version 2.16.7

Mozilla>>Bugzilla >> Version 2.16.8

Mozilla>>Bugzilla >> Version 2.16.9

Mozilla>>Bugzilla >> Version 2.16.10

Mozilla>>Bugzilla >> Version 2.16.11

Mozilla>>Bugzilla >> Version 2.16_rc2

    Mozilla>>Bugzilla >> Version 2.17

    Mozilla>>Bugzilla >> Version 2.17.1

    Mozilla>>Bugzilla >> Version 2.17.2

    Mozilla>>Bugzilla >> Version 2.17.3

    Mozilla>>Bugzilla >> Version 2.17.4

    Mozilla>>Bugzilla >> Version 2.17.5

    Mozilla>>Bugzilla >> Version 2.17.6

    Mozilla>>Bugzilla >> Version 2.17.7

    Mozilla>>Bugzilla >> Version 2.18

    Mozilla>>Bugzilla >> Version 2.18

    Mozilla>>Bugzilla >> Version 2.18

    Mozilla>>Bugzilla >> Version 2.18

    Mozilla>>Bugzilla >> Version 2.18.1

    Mozilla>>Bugzilla >> Version 2.18.2

    Mozilla>>Bugzilla >> Version 2.18.3

    Mozilla>>Bugzilla >> Version 2.18.4

    Mozilla>>Bugzilla >> Version 2.18.5

    Mozilla>>Bugzilla >> Version 2.18.6

    Mozilla>>Bugzilla >> Version 2.18.6\+

    Mozilla>>Bugzilla >> Version 2.18.7

    Mozilla>>Bugzilla >> Version 2.18.8

    Mozilla>>Bugzilla >> Version 2.18.9

    Mozilla>>Bugzilla >> Version 2.19

    Mozilla>>Bugzilla >> Version 2.19.1

    Mozilla>>Bugzilla >> Version 2.19.2

    Mozilla>>Bugzilla >> Version 2.19.3

    Mozilla>>Bugzilla >> Version 2.20

    Mozilla>>Bugzilla >> Version 2.20

    Mozilla>>Bugzilla >> Version 2.20

    Mozilla>>Bugzilla >> Version 2.20.1

    Mozilla>>Bugzilla >> Version 2.20.2

    Mozilla>>Bugzilla >> Version 2.20.3

    Mozilla>>Bugzilla >> Version 2.20.4

    Mozilla>>Bugzilla >> Version 2.20.5

    Mozilla>>Bugzilla >> Version 2.20.6

    Mozilla>>Bugzilla >> Version 2.20.7

    Mozilla>>Bugzilla >> Version 2.21

    Mozilla>>Bugzilla >> Version 2.21.1

    Mozilla>>Bugzilla >> Version 2.21.2

    Mozilla>>Bugzilla >> Version 2.22

    Mozilla>>Bugzilla >> Version 2.22

    Mozilla>>Bugzilla >> Version 2.22.1

    Mozilla>>Bugzilla >> Version 2.22.2

    Mozilla>>Bugzilla >> Version 2.22.3

    Mozilla>>Bugzilla >> Version 2.22.4

    Mozilla>>Bugzilla >> Version 2.22.5

    Mozilla>>Bugzilla >> Version 2.22.6

    Mozilla>>Bugzilla >> Version 2.22.7

    Mozilla>>Bugzilla >> Version 2.23

    Mozilla>>Bugzilla >> Version 2.23.1

    Mozilla>>Bugzilla >> Version 2.23.2

    Mozilla>>Bugzilla >> Version 2.23.3

    Mozilla>>Bugzilla >> Version 2.23.4

    Mozilla>>Bugzilla >> Version 3.2

    Mozilla>>Bugzilla >> Version 3.2

    Mozilla>>Bugzilla >> Version 3.2

    Mozilla>>Bugzilla >> Version 3.2.1

    Mozilla>>Bugzilla >> Version 3.2.2

    Mozilla>>Bugzilla >> Version 3.2.3

    Mozilla>>Bugzilla >> Version 3.2.4

    Mozilla>>Bugzilla >> Version 3.2.5

    Mozilla>>Bugzilla >> Version 3.2.6

    Mozilla>>Bugzilla >> Version 3.2.7

    Mozilla>>Bugzilla >> Version 3.2.8

    Mozilla>>Bugzilla >> Version 3.4.1

    Mozilla>>Bugzilla >> Version 3.4.2

    Mozilla>>Bugzilla >> Version 3.4.3

    Mozilla>>Bugzilla >> Version 3.4.4

    Mozilla>>Bugzilla >> Version 3.4.5

    Mozilla>>Bugzilla >> Version 3.4.6

    Mozilla>>Bugzilla >> Version 3.4.7

    Mozilla>>Bugzilla >> Version 3.4.8

    Mozilla>>Bugzilla >> Version 3.4.9

    Mozilla>>Bugzilla >> Version 3.6.0

    Mozilla>>Bugzilla >> Version 3.6.1

    Mozilla>>Bugzilla >> Version 3.6.2

    Mozilla>>Bugzilla >> Version 3.6.3

    Mozilla>>Bugzilla >> Version 4.0

    Mozilla>>Bugzilla >> Version 4.0

    References

    http://www.securityfocus.com/bid/45982
    Tags : vdb-entry, x_refsource_BID
    http://secunia.com/advisories/43165
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.vupen.com/english/advisories/2011/0271
    Tags : vdb-entry, x_refsource_VUPEN
    http://secunia.com/advisories/43033
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.vupen.com/english/advisories/2011/0207
    Tags : vdb-entry, x_refsource_VUPEN
    http://osvdb.org/70704
    Tags : vdb-entry, x_refsource_OSVDB
    http://www.debian.org/security/2011/dsa-2322
    Tags : vendor-advisory, x_refsource_DEBIAN