GSD-2002-0010
Vulnerability from gsd - Updated: 2023-12-13 01:24Details
Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2002-0010",
"description": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.",
"id": "GSD-2002-0010",
"references": [
"https://access.redhat.com/errata/RHSA-2002:001"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2002-0010"
],
"details": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.",
"id": "GSD-2002-0010",
"modified": "2023-12-13T01:24:07.892769Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0010",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html"
},
{
"name": "3805",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3805"
},
{
"name": "3802",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3802"
},
{
"name": "3801",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3801"
},
{
"name": "bugzilla-longlist-modify-sql(7811)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7811.php"
},
{
"name": "bugzilla-editusers-change-groupset(7814)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7814.php"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821",
"refsource": "MISC",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821"
},
{
"name": "bugzilla-buglist-sql-logic(7813)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7813.php"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812",
"refsource": "MISC",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812"
},
{
"name": "RHSA-2002:001",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2002-001.html"
},
{
"name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html"
},
{
"name": "bugzilla-buglist-modify-sql(7807)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7807.php"
},
{
"name": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch",
"refsource": "MISC",
"url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822",
"refsource": "MISC",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822"
},
{
"name": "http://www.bugzilla.org/security2_14_1.html",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security2_14_1.html"
},
{
"name": "bugzilla-userprefs-change-groupset(7809)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7809.php"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679",
"refsource": "MISC",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679"
},
{
"name": "3804",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3804"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690",
"refsource": "MISC",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.14.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0010"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the \"boolean chart\" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older",
"refsource": "BUGTRAQ",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html"
},
{
"name": "http://www.bugzilla.org/security2_14_1.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.bugzilla.org/security2_14_1.html"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812",
"refsource": "MISC",
"tags": [],
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108812"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822",
"refsource": "MISC",
"tags": [],
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108822"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821",
"refsource": "MISC",
"tags": [],
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=108821"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690",
"refsource": "MISC",
"tags": [],
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109690"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679",
"refsource": "MISC",
"tags": [],
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=109679"
},
{
"name": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch",
"refsource": "MISC",
"tags": [],
"url": "http://www.bugzilla.org/bugzilla2.14to2.14.1.patch"
},
{
"name": "RHSA-2002:001",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2002-001.html"
},
{
"name": "3801",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/3801"
},
{
"name": "3802",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/3802"
},
{
"name": "3804",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/3804"
},
{
"name": "3805",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/3805"
},
{
"name": "bugzilla-buglist-modify-sql(7807)",
"refsource": "XF",
"tags": [],
"url": "http://www.iss.net/security_center/static/7807.php"
},
{
"name": "bugzilla-editusers-change-groupset(7814)",
"refsource": "XF",
"tags": [],
"url": "http://www.iss.net/security_center/static/7814.php"
},
{
"name": "bugzilla-buglist-sql-logic(7813)",
"refsource": "XF",
"tags": [],
"url": "http://www.iss.net/security_center/static/7813.php"
},
{
"name": "bugzilla-longlist-modify-sql(7811)",
"refsource": "XF",
"tags": [],
"url": "http://www.iss.net/security_center/static/7811.php"
},
{
"name": "bugzilla-userprefs-change-groupset(7809)",
"refsource": "XF",
"tags": [],
"url": "http://www.iss.net/security_center/static/7809.php"
},
{
"name": "20020106 Inproper input validation in Bugzilla \u003c=2.14 - exploit",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2008-09-10T19:11Z",
"publishedDate": "2002-01-31T05:00Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…