CVE-2006-2420
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Bugzilla 2.20rc1 through 2.20 and 2.21.1, when using RSS 1.0, allows remote attackers to conduct cross-site scripting (XSS) attacks via a title element with HTML encoded sequences such as ">", which are automatically decoded by some RSS readers. NOTE: this issue is not in Bugzilla itself, but rather due to design or documentation inconsistencies within RSS, or implementation vulnerabilities in RSS readers. While this issue normally would not be included in CVE, it is being identified since the Bugzilla developers have addressed it.
Bugzilla 2.20rc1 hasta la versión 2.20 y 2.21.1, cuando utiliza RSS 1.0, permite a atacantes remotos llevar a cabo ataques de XSS a través de un elemento del título con secuencias HTML codificadas tales como ">", que son descodificadas automáticamente por algunos lectores RSS. NOTA: este problema no está en sí mismo en Bugzilla, sino más bien debido a su diseño o inconsistencias de documentación entre RSS, o vulnerabilidades de implementación en lectores RSS. Aunque este problema normalmente no se incluiría en una CVE, está siendo identificada dado que los desarrolladores de Bugzilla se han ocupado de ella.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-05-15 CVE Reserved
- 2006-05-16 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=112818466125484&w=2 | Mailing List | |
http://www.osvdb.org/23379 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24820 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/18979 | 2017-07-20 | |
http://www.bugzilla.org/security/2.18.4 | 2017-07-20 | |
https://bugzilla.mozilla.org/show_bug.cgi?id=313441 | 2017-07-20 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Bugzilla Search vendor "Mozilla" for product "Bugzilla" | 2.20 Search vendor "Mozilla" for product "Bugzilla" and version "2.20" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Bugzilla Search vendor "Mozilla" for product "Bugzilla" | 2.20 Search vendor "Mozilla" for product "Bugzilla" and version "2.20" | rc1 |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Bugzilla Search vendor "Mozilla" for product "Bugzilla" | 2.20 Search vendor "Mozilla" for product "Bugzilla" and version "2.20" | rc2 |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Bugzilla Search vendor "Mozilla" for product "Bugzilla" | 2.21 Search vendor "Mozilla" for product "Bugzilla" and version "2.21" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Bugzilla Search vendor "Mozilla" for product "Bugzilla" | 2.21.1 Search vendor "Mozilla" for product "Bugzilla" and version "2.21.1" | - |
Affected
|