Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2011-0046

Disclosure Date: January 28, 2011
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Multiple cross-site request forgery (CSRF) vulnerabilities in Bugzilla before 3.2.10, 3.4.x before 3.4.10, 3.6.x before 3.6.4, and 4.0.x before 4.0rc2 allow remote attackers to hijack the authentication of arbitrary users for requests related to (1) adding a saved search in buglist.cgi, (2) voting in votes.cgi, (3) sanity checking in sanitycheck.cgi, (4) creating or editing a chart in chart.cgi, (5) column changing in colchange.cgi, and (6) adding, deleting, or approving a quip in quips.cgi.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • mozilla

Products

  • bugzilla,
  • bugzilla 2.0,
  • bugzilla 2.10,
  • bugzilla 2.12,
  • bugzilla 2.14,
  • bugzilla 2.14.1,
  • bugzilla 2.14.2,
  • bugzilla 2.14.3,
  • bugzilla 2.14.4,
  • bugzilla 2.14.5,
  • bugzilla 2.16,
  • bugzilla 2.16 rc2,
  • bugzilla 2.16.1,
  • bugzilla 2.16.10,
  • bugzilla 2.16.11,
  • bugzilla 2.16.2,
  • bugzilla 2.16.3,
  • bugzilla 2.16.4,
  • bugzilla 2.16.5,
  • bugzilla 2.16.6,
  • bugzilla 2.16.7,
  • bugzilla 2.16.8,
  • bugzilla 2.16.9,
  • bugzilla 2.17,
  • bugzilla 2.17.1,
  • bugzilla 2.17.2,
  • bugzilla 2.17.3,
  • bugzilla 2.17.4,
  • bugzilla 2.17.5,
  • bugzilla 2.17.6,
  • bugzilla 2.17.7,
  • bugzilla 2.18,
  • bugzilla 2.18.1,
  • bugzilla 2.18.2,
  • bugzilla 2.18.3,
  • bugzilla 2.18.4,
  • bugzilla 2.18.5,
  • bugzilla 2.18.6,
  • bugzilla 2.18.6+,
  • bugzilla 2.18.7,
  • bugzilla 2.18.8,
  • bugzilla 2.18.9,
  • bugzilla 2.19,
  • bugzilla 2.19.1,
  • bugzilla 2.19.2,
  • bugzilla 2.19.3,
  • bugzilla 2.2,
  • bugzilla 2.20,
  • bugzilla 2.20.1,
  • bugzilla 2.20.2,
  • bugzilla 2.20.3,
  • bugzilla 2.20.4,
  • bugzilla 2.20.5,
  • bugzilla 2.20.6,
  • bugzilla 2.20.7,
  • bugzilla 2.21,
  • bugzilla 2.21.1,
  • bugzilla 2.21.2,
  • bugzilla 2.22,
  • bugzilla 2.22.1,
  • bugzilla 2.22.2,
  • bugzilla 2.22.3,
  • bugzilla 2.22.4,
  • bugzilla 2.22.5,
  • bugzilla 2.22.6,
  • bugzilla 2.22.7,
  • bugzilla 2.23,
  • bugzilla 2.23.1,
  • bugzilla 2.23.2,
  • bugzilla 2.23.3,
  • bugzilla 2.23.4,
  • bugzilla 2.4,
  • bugzilla 2.6,
  • bugzilla 2.8,
  • bugzilla 2.9,
  • bugzilla 3.2,
  • bugzilla 3.2.1,
  • bugzilla 3.2.2,
  • bugzilla 3.2.3,
  • bugzilla 3.2.4,
  • bugzilla 3.2.5,
  • bugzilla 3.2.6,
  • bugzilla 3.2.7,
  • bugzilla 3.2.8,
  • bugzilla 3.4.1,
  • bugzilla 3.4.2,
  • bugzilla 3.4.3,
  • bugzilla 3.4.4,
  • bugzilla 3.4.5,
  • bugzilla 3.4.6,
  • bugzilla 3.4.7,
  • bugzilla 3.4.8,
  • bugzilla 3.4.9,
  • bugzilla 3.6.0,
  • bugzilla 3.6.1,
  • bugzilla 3.6.2,
  • bugzilla 3.6.3,
  • bugzilla 4.0

Additional Info

Technical Analysis