Files
CVEs-PoC/2014/CVE-2014-1546.md
T
2024-06-18 02:51:15 +02:00

18 lines
996 B
Markdown

### [CVE-2014-1546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1546)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1036213
#### Github
No PoCs found on GitHub currently.