CVE-2002-0010 (GCVE-0-2002-0010)

Vulnerability from cvelistv5 – Published: 2002-01-10 05:00 – Updated: 2024-08-08 02:35
VLAI?
Summary
Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:35:17.413Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html"
          },
          {
            "name": "3805",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3805"
          },
          {
            "name": "3802",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3802"
          },
          {
            "name": "3801",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3801"
          },
          {
            "name": "bugzilla-longlist-modify-sql(7811)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7811.php"
          },
          {
            "name": "bugzilla-editusers-change-groupset(7814)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7814.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821"
          },
          {
            "name": "bugzilla-buglist-sql-logic(7813)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7813.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812"
          },
          {
            "name": "RHSA-2002:001",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html"
          },
          {
            "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html"
          },
          {
            "name": "bugzilla-buglist-modify-sql(7807)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7807.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.bugzilla.org/security2_14_1.html"
          },
          {
            "name": "bugzilla-userprefs-change-groupset(7809)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7809.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679"
          },
          {
            "name": "3804",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3804"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-01-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-07-03T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html"
        },
        {
          "name": "3805",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3805"
        },
        {
          "name": "3802",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3802"
        },
        {
          "name": "3801",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3801"
        },
        {
          "name": "bugzilla-longlist-modify-sql(7811)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7811.php"
        },
        {
          "name": "bugzilla-editusers-change-groupset(7814)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7814.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821"
        },
        {
          "name": "bugzilla-buglist-sql-logic(7813)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7813.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812"
        },
        {
          "name": "RHSA-2002:001",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html"
        },
        {
          "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html"
        },
        {
          "name": "bugzilla-buglist-modify-sql(7807)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7807.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.bugzilla.org/security2_14_1.html"
        },
        {
          "name": "bugzilla-userprefs-change-groupset(7809)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7809.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679"
        },
        {
          "name": "3804",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3804"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0010",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html"
            },
            {
              "name": "3805",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3805"
            },
            {
              "name": "3802",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3802"
            },
            {
              "name": "3801",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3801"
            },
            {
              "name": "bugzilla-longlist-modify-sql(7811)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7811.php"
            },
            {
              "name": "bugzilla-editusers-change-groupset(7814)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7814.php"
            },
            {
              "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821",
              "refsource": "MISC",
              "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821"
            },
            {
              "name": "bugzilla-buglist-sql-logic(7813)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7813.php"
            },
            {
              "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812",
              "refsource": "MISC",
              "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812"
            },
            {
              "name": "RHSA-2002:001",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html"
            },
            {
              "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html"
            },
            {
              "name": "bugzilla-buglist-modify-sql(7807)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7807.php"
            },
            {
              "name": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch",
              "refsource": "MISC",
              "url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch"
            },
            {
              "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822",
              "refsource": "MISC",
              "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822"
            },
            {
              "name": "http://www.bugzilla.org/security2_14_1.html",
              "refsource": "CONFIRM",
              "url": "http://www.bugzilla.org/security2_14_1.html"
            },
            {
              "name": "bugzilla-userprefs-change-groupset(7809)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7809.php"
            },
            {
              "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679",
              "refsource": "MISC",
              "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679"
            },
            {
              "name": "3804",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3804"
            },
            {
              "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690",
              "refsource": "MISC",
              "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0010",
    "datePublished": "2002-01-10T05:00:00",
    "dateReserved": "2002-01-09T00:00:00",
    "dateUpdated": "2024-08-08T02:35:17.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2002-0010\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-01-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \\\"boolean chart\\\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.\"},{\"lang\":\"es\",\"value\":\"Bugzilla anterior a la 2.14.1 permite que usuarios remotos inyecten c\u00f3digo SQL o creen ficheros u obtengan privilegios por medio de (1) el par\u00e1metro sql en buglist.cgi, (2) nombres de campos inv\u00e1lidos en la petici\u00f3n \\\"boolean chart\\\" en buglist.cgi,  (3) el par\u00e1metro mybugslink en userprefs.cgi, (4) una ID de bug mal escrita en el par\u00e1metro buglist en long_list.cgi y (5) el valor del par\u00e1metro en editusers.cgi, lo cual permite que los permisos de grupo sean modificados por permisos de grupo especial.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.14.1\",\"matchCriteriaId\":\"F99F6759-911F-4616-B27E-0EF33A08F2D3\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108812\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108821\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108822\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109679\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109690\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2002-001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugzilla.org/bugzilla2.14to2.14.1.patch\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugzilla.org/security2_14_1.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7807.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7809.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7811.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7813.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7814.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3801\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3802\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3804\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/3805\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108812\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=108822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugzilla.mozilla.org/show_bug.cgi?id=109690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2002-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bugzilla.org/bugzilla2.14to2.14.1.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bugzilla.org/security2_14_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7807.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7809.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7811.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7813.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7814.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/3805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…