CVE-2002-0010 (GCVE-0-2002-0010)
Vulnerability from cvelistv5
Published
2002-01-10 05:00
Modified
2024-08-08 02:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html" }, { "name": "3805", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3805" }, { "name": "3802", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3802" }, { "name": "3801", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3801" }, { "name": "bugzilla-longlist-modify-sql(7811)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7811.php" }, { "name": "bugzilla-editusers-change-groupset(7814)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7814.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821" }, { "name": "bugzilla-buglist-sql-logic(7813)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7813.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812" }, { "name": "RHSA-2002:001", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html" }, { "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html" }, { "name": "bugzilla-buglist-modify-sql(7807)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7807.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.bugzilla.org/security2_14_1.html" }, { "name": "bugzilla-userprefs-change-groupset(7809)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7809.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679" }, { "name": "3804", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3804" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-03T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html" }, { "name": "3805", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3805" }, { "name": "3802", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3802" }, { "name": "3801", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3801" }, { "name": "bugzilla-longlist-modify-sql(7811)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7811.php" }, { "name": "bugzilla-editusers-change-groupset(7814)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7814.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821" }, { "name": "bugzilla-buglist-sql-logic(7813)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7813.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812" }, { "name": "RHSA-2002:001", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html" }, { "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html" }, { "name": "bugzilla-buglist-modify-sql(7807)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7807.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.bugzilla.org/security2_14_1.html" }, { "name": "bugzilla-userprefs-change-groupset(7809)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7809.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679" }, { "name": "3804", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3804" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html" }, { "name": "3805", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3805" }, { "name": "3802", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3802" }, { "name": "3801", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3801" }, { "name": "bugzilla-longlist-modify-sql(7811)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7811.php" }, { "name": "bugzilla-editusers-change-groupset(7814)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7814.php" }, { "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821", "refsource": "MISC", "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821" }, { "name": "bugzilla-buglist-sql-logic(7813)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7813.php" }, { "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812", "refsource": "MISC", "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812" }, { "name": "RHSA-2002:001", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html" }, { "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html" }, { "name": "bugzilla-buglist-modify-sql(7807)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7807.php" }, { "name": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch", "refsource": "MISC", "url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch" }, { "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822", "refsource": "MISC", "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822" }, { "name": "http://www.bugzilla.org/security2_14_1.html", "refsource": "CONFIRM", "url": "http://www.bugzilla.org/security2_14_1.html" }, { "name": "bugzilla-userprefs-change-groupset(7809)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7809.php" }, { "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679", "refsource": "MISC", "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679" }, { "name": "3804", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3804" }, { "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690", "refsource": "MISC", "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0010", "datePublished": "2002-01-10T05:00:00", "dateReserved": "2002-01-09T00:00:00", "dateUpdated": "2024-08-08T02:35:17.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2002-0010\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-01-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \\\"boolean chart\\\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.\"},{\"lang\":\"es\",\"value\":\"Bugzilla anterior a la 2.14.1 permite que usuarios remotos inyecten c\u00f3digo SQL o creen ficheros u obtengan privilegios por medio de (1) el par\u00e1metro sql en buglist.cgi, (2) nombres de campos inv\u00e1lidos en la petici\u00f3n \\\"boolean chart\\\" en buglist.cgi, (3) el par\u00e1metro mybugslink en userprefs.cgi, (4) una ID de bug mal escrita en el par\u00e1metro buglist en long_list.cgi y (5) el valor del par\u00e1metro en editusers.cgi, lo cual permite que los permisos de grupo sean modificados por permisos de grupo especial.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.14.1\",\"matchCriteriaId\":\"F99F6759-911F-4616-B27E-0EF33A08F2D3\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108812\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108821\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108822\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109679\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109690\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2002-001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugzilla.org/bugzilla2.14to2.14.1.patch\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugzilla.org/security2_14_1.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7807.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7809.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7811.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7813.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7814.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3801\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3802\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3804\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3805\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108812\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2002-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bugzilla.org/bugzilla2.14to2.14.1.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bugzilla.org/security2_14_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7807.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7809.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7811.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7813.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7814.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…