Mozilla is warning users who have contributed to testing builds of the online bug-tracking tool Bugzilla that their email addresses and encrypted passwords were publicly available for a period of three months.
The information of 97,000 users who had created test installations on landfill.bugzilla.org were inadvertently posted to a public Web server on May 4, when the server for test builds was migrated. The leak was discovered by a Bugzilla developer.
"As soon as we became aware, the database dump files were removed from the server immediately, and we’ve modified the testing process to not require database dumps," Mark Côté, assistant project lead at Bugzilla, noted in a blog post.
"Generally, developers who use our test builds have told us they understand that these builds are insecure and may break, so they do not use passwords they would reuse elsewhere," Côté said.
However, as a precaution, passwords on all test systems have been reset. Users will be required to set new ones next time they access Bugzilla test systems. Users of bugzilla.mozilla.org are not affected by the incident, unless they have used the same password as on landfill.bugzilla.org, Côté clarified.