Bugzilla account creation email address SQL injection

bugzilla-email-sql-injection (10235) The risk level is classified as MediumMedium Risk


Bugzilla is vulnerable to SQL injection when a new account is being created. A remote attacker could insert SQL commands into the email address field when creating a new user, which would allow the attacker to add, modify, or delete data in the backend database, once the email address is submitted.


Data Manipulation


Upgrade to the latest version of Bugzilla (2.16.1 or later), as listed in Bugzilla Security Advisory October 1st, 2002. See References.


  • Bugzilla Security Advisory October 1st, 2002: Bugzilla Security Advisory for v2.14.3 and v2.16.
  • Bugzilla Web site: Bugzilla Project - Download.
  • Bugzilla Web site: Bug 165221 - Apostrophes are not properly handled in e-mail addresses.
  • BID-5842: Bugzilla Account Creation SQL Injection Vulnerability
  • CVE-2002-1198: Bugzilla 2.16.x before 2.16.1 does not properly filter apostrophes from an email address during account creation, which allows remote attackers to execute arbitrary SQL via a SQL injection attack.
  • OSVDB ID: 6353: Bugzilla New Account Creation SQL Injection

Platforms Affected:

  • Mozilla Bugzilla 2.14
  • Mozilla Bugzilla 2.14.1
  • Mozilla Bugzilla 2.14.2
  • Mozilla Bugzilla 2.14.3
  • Mozilla Bugzilla 2.14.4
  • Mozilla Bugzilla 2.16


Oct 01, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page