Show plain JSON{"id": "CVE-2012-0440", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-02-02T18:55:01.910", "references": [{"url": "http://secunia.com/advisories/47814", "source": "cve@mitre.org"}, {"url": "http://www.bugzilla.org/security/3.4.13/", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1026623", "source": "cve@mitre.org"}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718319", "tags": ["Exploit", "Patch"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72882", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/47814", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.bugzilla.org/security/3.4.13/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1026623", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718319", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72882", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in jsonrpc.cgi in Bugzilla 3.5.x and 3.6.x before 3.6.8, 3.7.x and 4.0.x before 4.0.4, and 4.1.x and 4.2.x before 4.2rc2 allows remote attackers to hijack the authentication of arbitrary users for requests that use the JSON-RPC API."}, {"lang": "es", "value": "Una vulnerabilidad de falsificaci\u00f3n solicitudes en sitios cruzados(CSRF) en jsonrpc.cgi en Bugzilla v3.5.x y 3.6.x antes de v3.6.8, v3.7.x y v4.0.x antes de v4.0.4 y v4.1.x y v4.2.x antes v4.2rc2 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios para las solicitudes que utilizan la API de JSON-RPC."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}