Vulnerability Name:

CVE-2002-0010 (CCN-7807)

Assigned:2002-01-05
Published:2002-01-05
Updated:2008-09-10
Summary:Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: BUGTRAQ
Type: Patch, Vendor Advisory
20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older

Source: CCN
Type: BugTraq Mailing List, Sat Jan 05 2002 - 17:45:29 CST
Security Advisory for Bugzilla v2.15 (cvs20020103) and older

Source: BUGTRAQ
Type: UNKNOWN
20020106 Inproper input validation in Bugzilla <=2.14 - exploit

Source: CCN
Type: BugTraq Mailing List, Sun Jan 06 2002 - 05:34:01 CST
Inproper input validation in Bugzilla <=2.14 - exploit

Source: MISC
Type: UNKNOWN
http://bugzilla.mozilla.org/show_bug.cgi?id=108812

Source: MISC
Type: UNKNOWN
http://bugzilla.mozilla.org/show_bug.cgi?id=108821

Source: MISC
Type: UNKNOWN
http://bugzilla.mozilla.org/show_bug.cgi?id=108822

Source: MISC
Type: UNKNOWN
http://bugzilla.mozilla.org/show_bug.cgi?id=109679

Source: MISC
Type: UNKNOWN
http://bugzilla.mozilla.org/show_bug.cgi?id=109690

Source: MITRE
Type: CNA
CVE-2002-0010

Source: CCN
Type: RHSA-2002-001
Updated bugzilla packages available

Source: REDHAT
Type: UNKNOWN
RHSA-2002:001

Source: MISC
Type: UNKNOWN
http://www.bugzilla.org/bugzilla2.14to2.14.1.patch

Source: CCN
Type: Bugzilla Web site
Bugzilla 2.14.1 Release Notes

Source: CCN
Type: Bugzilla Security Advisory Jan 5th, 2002
Bugzilla 2.14.1 Released!

Source: CONFIRM
Type: UNKNOWN
http://www.bugzilla.org/security2_14_1.html

Source: XF
Type: UNKNOWN
bugzilla-buglist-modify-sql(7807)

Source: XF
Type: UNKNOWN
bugzilla-userprefs-change-groupset(7809)

Source: XF
Type: UNKNOWN
bugzilla-longlist-modify-sql(7811)

Source: XF
Type: UNKNOWN
bugzilla-buglist-sql-logic(7813)

Source: XF
Type: UNKNOWN
bugzilla-editusers-change-groupset(7814)

Source: BID
Type: UNKNOWN
3801

Source: CCN
Type: BID-3801
BugZilla BugList.CGI SQL Query Manipulation Vulnerability

Source: BID
Type: UNKNOWN
3802

Source: CCN
Type: BID-3802
BugZilla UserPrefs.CGI Groupset Form Element Manipulation Vulnerability

Source: BID
Type: UNKNOWN
3804

Source: CCN
Type: BID-3804
BugZilla BugList.CGI HTML Form SQL Query Manipulation Vulnerability

Source: BID
Type: UNKNOWN
3805

Source: CCN
Type: BID-3805
BugZilla LongList.CGI SQL Query Manipulation Vulnerability

Source: XF
Type: UNKNOWN
bugzilla-buglist-modify-sql(7807)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:bugzilla:*:*:*:*:*:*:*:* (Version <= 2.14.1)

  • Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0010 (CCN-7809)

    Assigned:2002-01-05
    Published:2002-01-05
    Updated:2002-01-05
    Summary:A vulnerability in the userprefs.cgi script in Bugzilla could allow a remote attacker to change their groupset. If a remote attacker places single quotes (') in the mybugslink variable in the userprefs.cgi form, the attacker can change their groupset and view information in other groups.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): None
    Availibility (A): None
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): None
    Availibility (A): None
    Vulnerability Consequences:Obtain Information
    References:Source: CCN
    Type: BugTraq Mailing List, Sun Jan 06 2002 - 05:34:01 CST
    Inproper input validation in Bugzilla <=2.14 - exploit

    Source: MITRE
    Type: CNA
    CVE-2002-0010

    Source: CCN
    Type: RHSA-2002-001
    Updated bugzilla packages available

    Source: CCN
    Type: Bugzilla Web site
    Bugzilla 2.14.1 Release Notes

    Source: CCN
    Type: Bugzilla Security Advisory Jan 5th, 2002
    Bugzilla 2.14.1 Released!

    Source: CCN
    Type: BID-3801
    BugZilla BugList.CGI SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3802
    BugZilla UserPrefs.CGI Groupset Form Element Manipulation Vulnerability

    Source: CCN
    Type: BID-3804
    BugZilla BugList.CGI HTML Form SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3805
    BugZilla LongList.CGI SQL Query Manipulation Vulnerability

    Source: XF
    Type: UNKNOWN
    bugzilla-userprefs-change-groupset(7809)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0010 (CCN-7811)

    Assigned:2002-01-05
    Published:2002-01-05
    Updated:2008-09-10
    Summary:Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): None
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): None
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Data Manipulation
    References:Source: CCN
    Type: BugTraq Mailing List, Sun Jan 06 2002 - 05:34:01 CST
    Inproper input validation in Bugzilla <=2.14 - exploit

    Source: MITRE
    Type: CNA
    CVE-2002-0010

    Source: CCN
    Type: RHSA-2002-001
    Updated bugzilla packages available

    Source: CCN
    Type: Bugzilla Web site
    Bugzilla 2.14.1 Release Notes

    Source: CCN
    Type: Bugzilla Security Advisory Jan 5th, 2002
    Bugzilla 2.14.1 Released!

    Source: CCN
    Type: BID-3801
    BugZilla BugList.CGI SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3802
    BugZilla UserPrefs.CGI Groupset Form Element Manipulation Vulnerability

    Source: CCN
    Type: BID-3804
    BugZilla BugList.CGI HTML Form SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3805
    BugZilla LongList.CGI SQL Query Manipulation Vulnerability

    Source: XF
    Type: UNKNOWN
    bugzilla-longlist-modify-sql(7811)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0010 (CCN-7813)

    Assigned:2002-01-05
    Published:2002-01-05
    Updated:2002-01-05
    Summary:A vulnerability in the buglist.cgi script in Bugzilla could allow a remote attacker to modify the logic of SQL queries. A remote attacker can save the "boolean chart" query form locally and edit the HTML source to manipulate the logic of SQL queries, which could be used to perform malicious action on the database once the form is submitted.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): None
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): None
    Vulnerability Consequences:Data Manipulation
    References:Source: CCN
    Type: BugTraq Mailing List, Sun Jan 06 2002 - 05:34:01 CST
    Inproper input validation in Bugzilla <=2.14 - exploit

    Source: MITRE
    Type: CNA
    CVE-2002-0010

    Source: CCN
    Type: RHSA-2002-001
    Updated bugzilla packages available

    Source: CCN
    Type: Bugzilla Web site
    Bugzilla 2.14.1 Release Notes

    Source: CCN
    Type: Bugzilla Security Advisory Jan 5th, 2002
    Bugzilla 2.14.1 Released!

    Source: CCN
    Type: BID-3801
    BugZilla BugList.CGI SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3802
    BugZilla UserPrefs.CGI Groupset Form Element Manipulation Vulnerability

    Source: CCN
    Type: BID-3804
    BugZilla BugList.CGI HTML Form SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3805
    BugZilla LongList.CGI SQL Query Manipulation Vulnerability

    Source: XF
    Type: UNKNOWN
    bugzilla-buglist-sql-logic(7813)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0010 (CCN-7814)

    Assigned:2002-01-05
    Published:2002-01-05
    Updated:2002-01-05
    Summary:A vulnerability in the editusers.cgi script in Bugzilla could allow a remote attacker with blessgroupset privileges to change their groupset. A remote attacker can save the editusers.cgi form locally and edit the HTML source to modify a form value to change their groupset once the form is submitted. An attacker can use this vulnerability to view information in other groups.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): None
    Availibility (A): None
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): None
    Availibility (A): None
    Vulnerability Consequences:Obtain Information
    References:Source: MITRE
    Type: CNA
    CVE-2002-0010

    Source: CCN
    Type: RHSA-2002-001
    Updated bugzilla packages available

    Source: CCN
    Type: Bugzilla Web site
    Bugzilla 2.14.1 Release Notes

    Source: CCN
    Type: Bugzilla Security Advisory Jan 5th, 2002
    Bugzilla 2.14.1 Released!

    Source: CCN
    Type: BID-3801
    BugZilla BugList.CGI SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3802
    BugZilla UserPrefs.CGI Groupset Form Element Manipulation Vulnerability

    Source: CCN
    Type: BID-3804
    BugZilla BugList.CGI HTML Form SQL Query Manipulation Vulnerability

    Source: CCN
    Type: BID-3805
    BugZilla LongList.CGI SQL Query Manipulation Vulnerability

    Source: XF
    Type: UNKNOWN
    bugzilla-editusers-change-groupset(7814)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mozilla bugzilla *
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0