Vulnerability Details : CVE-2002-0010
Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
Exploit prediction scoring system (EPSS) score for CVE-2002-0010
Probability of exploitation activity in the next 30 days: 1.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0010
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0010
-
http://www.securityfocus.com/bid/3804
-
http://www.iss.net/security_center/static/7809.php
-
http://www.securityfocus.com/bid/3801
- http://rhn.redhat.com/errata/RHSA-2002-001.html
-
http://www.iss.net/security_center/static/7814.php
-
http://www.bugzilla.org/bugzilla2.14to2.14.1.patch
-
http://www.securityfocus.com/bid/3802
-
http://www.iss.net/security_center/static/7807.php
-
http://www.securityfocus.com/bid/3805
-
http://www.iss.net/security_center/static/7813.php
-
http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html
Patch;Vendor Advisory
-
http://bugzilla.mozilla.org/show_bug.cgi?id=109679
-
http://bugzilla.mozilla.org/show_bug.cgi?id=108812
-
http://bugzilla.mozilla.org/show_bug.cgi?id=109690
-
http://archives.neohapsis.com/archives/bugtraq/2002-01/0052.html
-
http://www.iss.net/security_center/static/7811.php
-
http://bugzilla.mozilla.org/show_bug.cgi?id=108822
-
http://bugzilla.mozilla.org/show_bug.cgi?id=108821
- http://www.bugzilla.org/security2_14_1.html
Products affected by CVE-2002-0010
- cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*