All the vulnerabilites related to mantisBT - mantisBT
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:36
Severity ?
Summary
MantisBT before 1.2.9 does not properly check permissions, which allows remote authenticated users with manager privileges to (1) modify or (2) delete global categories.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "79367D94-9665-49D7-94E4-CC9EFC7439BB", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.9 does not properly check permissions, which allows remote authenticated users with manager privileges to (1) modify or (2) delete global categories." }, { "lang": "es", "value": "MantisBT anteriores a 1.2.9 no comprueba adecuadamente permisos, lo que permite a usuarios autenticados remotos con privilegios de manager (1) modificar o (2) borrar categor\u00edas globales." } ], "id": "CVE-2012-1121", "lastModified": "2024-11-21T01:36:28.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:03.017", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=13561" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/9443258724e84cb388aa1865b775beaecd80596d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=13561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/9443258724e84cb388aa1865b775beaecd80596d" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-15 14:55
Modified
2024-11-21 01:50
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in core/summary_api.php in MantisBT 1.2.12 allow remote authenticated users with manager or administrator permissions to inject arbitrary web script or HTML via a (1) category name in the summary_print_by_category function or (2) project name in the summary_print_by_project function.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in core/summary_api.php in MantisBT 1.2.12 allow remote authenticated users with manager or administrator permissions to inject arbitrary web script or HTML via a (1) category name in the summary_print_by_category function or (2) project name in the summary_print_by_project function." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en core/summary_api.php en MantisBT 1.2.12 permiten a usuarios remotos autenticados con permisos de gestor o administrador inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del nombre de (1) categor\u00eda en la funci\u00f3n summary_print_by_category o (2) proyecto en la funci\u00f3n summary_print_by_project." } ], "id": "CVE-2013-1810", "lastModified": "2024-11-21T01:50:26.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-05-15T14:55:06.747", "references": [ { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q1/127" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q1/556" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51853" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=15384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q1/127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q1/556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=15384" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-26 15:59
Modified
2024-11-21 02:21
Severity ?
Summary
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F99FC-A5C4-4858-9013-C88827660E20", "versionEndIncluding": "1.2.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D355450F-4354-4E0B-BA86-A6BCF0672E1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4." }, { "lang": "es", "value": "MantisBT anterior a 1.2.19 y 1.3.x anterior a 1.3.0-beta.2 no restringe correctamente el acceso a /*/install.php, lo que permite a atacantes remotos obtener credenciales de la base de datos a trav\u00e9s del par\u00e1metro install con el valor 4." } ], "id": "CVE-2014-9572", "lastModified": "2024-11-21T02:21:09.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-26T15:59:11.643", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2015/q1/158" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100211" }, { "source": "cve@mitre.org", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2015/q1/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17939" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-06 21:59
Modified
2024-11-21 02:20
Severity ?
Summary
MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0." }, { "lang": "es", "value": "MantisBT anterior a 1.2.18 utiliza el valor del par\u00e1metro public_key como la clave para la respuesta CAPTCHA, lo que permite a atacantes remotos evadir el mecanismo de protecci\u00f3n CAPTCHA mediante el aprovechamiento de conocimiento de una respuesta CAPTCHA para un valor del par\u00e1metro public_key, tal y como fue demostrado por E4652 por el valor public_key 0." } ], "id": "CVE-2014-9117", "lastModified": "2024-11-21T02:20:14.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-06T21:59:02.547", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/26/19" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/27/8" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71321" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99004" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/7bb78e45" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/26/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/27/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/7bb78e45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17811" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-30 06:29
Modified
2024-11-21 04:10
Severity ?
Summary
MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908 | Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=23908 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=23908 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A6D63BB-4B3B-4A6B-8B4B-EA09162CE1A3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass" }, { "lang": "es", "value": "** EN DISPUTA ** MantisBT 2.10.0 permite que usuarios locales lleven a cabo ataques de inyecci\u00f3n SQL mediante el par\u00e1metro sql en vendor/adodb/adodb-php/server.php en una petici\u00f3n a la direcci\u00f3n IP 127.0.0.1. NOTA: el fabricante discute la importancia de este informe porque se supone que server.php debe ejecutar instrucciones SQL arbitrarias en nombre de usuarios autenticados de 127.0.0.1 y que este problema no tiene una omisi\u00f3n de autenticaci\u00f3n." } ], "id": "CVE-2018-6382", "lastModified": "2024-11-21T04:10:36.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-30T06:29:00.320", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23908" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-20 22:15
Modified
2024-12-18 18:03
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
Summary
MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "81B9361B-548F-4857-87ED-35D90583B988", "versionEndExcluding": "2.26.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user\u0027s email address and username can hijack the user\u0027s account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`." }, { "lang": "es", "value": "MantisBT es un rastreador de problemas de c\u00f3digo abierto. Antes de la versi\u00f3n 2.26.1, un atacante no autenticado que conoce la direcci\u00f3n de correo electr\u00f3nico y el nombre de usuario de un usuario puede secuestrar la cuenta del usuario envenenando el enlace en el mensaje de notificaci\u00f3n de restablecimiento de contrase\u00f1a. Hay un parche disponible en la versi\u00f3n 2.26.1. Como workaround, defina `$g_path` seg\u00fan corresponda en `config_inc.php`." } ], "id": "CVE-2024-23830", "lastModified": "2024-12-18T18:03:25.023", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-20T22:15:08.460", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=19381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=19381" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-28 15:59
Modified
2024-11-21 02:20
Severity ?
Summary
Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 1.2 | |
mantisbt | mantisbt | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "87E89840-3B57-4CBA-BE90-0BBA61F21F96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en view_all_bug_page.php en MantisBT anterior a 1.2.18 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro (1) sort o (2) dir en view_all_set.php." } ], "id": "CVE-2014-9089", "lastModified": "2024-11-21T02:20:11.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-28T15:59:11.260", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/25/14" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/26/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/71298" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/25/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/26/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/71298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17841" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-12 14:29
Modified
2024-11-21 02:21
Severity ?
Summary
CAPTCHA bypass vulnerability in MantisBT before 1.2.19.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F99FC-A5C4-4858-9013-C88827660E20", "versionEndIncluding": "1.2.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CAPTCHA bypass vulnerability in MantisBT before 1.2.19." }, { "lang": "es", "value": "Existe una vulnerabilidad de omisi\u00f3n de CAPTCHA en MantisBT en versiones anteriores a la 1.2.19." } ], "id": "CVE-2014-9624", "lastModified": "2024-11-21T02:21:16.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-12T14:29:00.207", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/18/11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031633" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183593" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100213" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt\u0026version=1.2.19" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/18/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt\u0026version=1.2.19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17984" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-04 21:59
Modified
2024-11-21 02:21
Severity ?
Summary
MantisBT before 1.2.18 does not properly check permissions when sending an email that indicates when a monitored issue is related to another issue, which allows remote authenticated users to obtain sensitive information about restricted issues.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.18 does not properly check permissions when sending an email that indicates when a monitored issue is related to another issue, which allows remote authenticated users to obtain sensitive information about restricted issues." }, { "lang": "es", "value": "MantisBT anterior a 1.2.18 no comprueba correctamente los permisos cuando env\u00eda una email que indica cuando un problema monitorizado est\u00e1 relacionado con otro problema, lo que permite a usuarios remotos autenticados obtener informaci\u00f3n sensible sobre los problemas restringidos." } ], "id": "CVE-2014-9506", "lastModified": "2024-11-21T02:21:02.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-04T21:59:03.603", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=9885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=9885" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-21 14:29
Modified
2024-11-21 03:32
Severity ?
Summary
MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0A45AF0-9B5E-4445-BF5F-7FDE0DECB951", "versionEndIncluding": "1.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B537D8BB-944B-4B92-B48D-0CA5A2D01372", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "39492D12-1A13-43CE-84A7-F5CCFB87D612", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E6AF670-28C3-4D7E-9EB4-E0B366CE818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "021CC8F4-B310-4DBF-9D50-B8A357158E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D73E7205-12E1-4C57-A120-91C4C0760305", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2550F1FD-5104-4BAA-80F6-C6202D7326B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F89D994-7F93-4839-8A57-F4CD633576E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2154CE53-2DED-4023-96D5-515468E226B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "CFF4779C-8E14-4CB1-BCB4-80F4C5020629", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9258FCA1-6948-4DFE-BE50-5A39B5A64120", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \\/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI." }, { "lang": "es", "value": "MantisBT antes de v1.3.11, 2.x antes de v2.3.3 y 2.4.x antes de v2.4.1 omite una verificaci\u00f3n de barra invertida en string_api.php y, en consecuencia, tiene interpretaciones conflictivas de una subcadena inicial \\/ como introducci\u00f3n de una ruta de acceso local o un host remoto, que conduce a (1) una inyecci\u00f3n arbitraria de HTTP a trav\u00e9s de ataques CSRF en un URI permalink_page.php?url= y (2) una redirecci\u00f3n abierta a trav\u00e9s de un URI login_page.php?return=." } ], "id": "CVE-2017-7620", "lastModified": "2024-11-21T03:32:18.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-21T14:29:00.180", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038538" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://mantisbt.org/bugs/view.php?id=22702" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://mantisbt.org/bugs/view.php?id=22816" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.exploit-db.com/exploits/42043/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://mantisbt.org/bugs/view.php?id=22702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://mantisbt.org/bugs/view.php?id=22816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.exploit-db.com/exploits/42043/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-21 19:15
Modified
2024-11-21 04:28
Severity ?
Summary
The Timeline feature in my_view_page.php in MantisBT through 2.21.1 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed for any user having visibility to the issue, whenever My View Page is displayed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27 | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=25995 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=25995 | Exploit, Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB23C4D0-8FC1-4852-8810-F6DE17109BF5", "versionEndIncluding": "2.21.1", "versionStartIncluding": "2.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Timeline feature in my_view_page.php in MantisBT through 2.21.1 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed for any user having visibility to the issue, whenever My View Page is displayed." }, { "lang": "es", "value": "La funci\u00f3n de l\u00ednea de tiempo en my_view_page.php en MantisBT a trav\u00e9s de la versi\u00f3n 2.21.1 tiene una vulnerabilidad de cross-site scripting (XSS) almacenada, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario (si la configuraci\u00f3n de CSP lo permite) despu\u00e9s de cargar un archivo adjunto con un nombre de archivo creado. El c\u00f3digo se ejecuta para cualquier usuario que tenga visibilidad del problema, siempre que se muestre Mi p\u00e1gina de vista." } ], "id": "CVE-2019-15074", "lastModified": "2024-11-21T04:28:00.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-21T19:15:13.920", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=25995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=25995" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:36
Severity ?
Summary
MantisBT before 1.2.9 does not audit when users copy or clone a bug report, which makes it easier for remote attackers to copy bug reports without detection.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "79367D94-9665-49D7-94E4-CC9EFC7439BB", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.9 does not audit when users copy or clone a bug report, which makes it easier for remote attackers to copy bug reports without detection." }, { "lang": "es", "value": "MantisBT anteriores a 1.2.9 no audita la acci\u00f3n de un usuario de copiar o clonar un reporte de bug, lo que facilita a atacantes remotos copiar reportes de bug sin detecci\u00f3n." } ], "id": "CVE-2012-1119", "lastModified": "2024-11-21T01:36:28.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:02.907", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=13816" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/cf5df427f17cf9204645f83e000665780eb9afe6" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/dea7e315f3fc96dfa995e56e8810845fc07a47aa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=13816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/cf5df427f17cf9204645f83e000665780eb9afe6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/dea7e315f3fc96dfa995e56e8810845fc07a47aa" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-24 15:59
Modified
2024-11-21 02:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the "set configuration" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the \"set configuration\" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la casilla \u0027set configuration\u0027 en la p\u00e1gina Configuration Report (adm_config_report.php) en MantisBT 1.2.13 hasta la versi\u00f3n 1.2.17, permite a administradores remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro config_option, una vulnerabilidad diferente a CVE-2014-8986." } ], "id": "CVE-2014-8987", "lastModified": "2024-11-21T02:20:02.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-08-24T15:59:01.793", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17870" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/14/9" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/4" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/19/21" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/49c3d089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/14/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/19/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/49c3d089" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-10 10:59
Modified
2024-11-21 03:30
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in view_filters_page.php in MantisBT before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the 'view_type' parameter.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mantisbt.org/bugs/view.php?id=22497 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2017/03/10/1 | Exploit, Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/96819 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://mantisbt.org/bugs/view.php?id=22497 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2017/03/10/1 | Exploit, Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96819 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95 | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9031423-4FC3-40C2-BAF3-93D6E49B0563", "versionEndIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in view_filters_page.php in MantisBT before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the \u0027view_type\u0027 parameter." }, { "lang": "es", "value": "Una vulnerabilidad de XSS en view_filters_page.php en MantisBT en versiones anteriores a 2.2.1 permite a atacantes remotos inyectar c\u00f3digo JavaScript arbitrario a trav\u00e9s del par\u00e1metro \u0027view_type\u0027." } ], "id": "CVE-2017-6799", "lastModified": "2024-11-21T03:30:33.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-10T10:59:00.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "http://mantisbt.org/bugs/view.php?id=22497" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96819" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "http://mantisbt.org/bugs/view.php?id=22497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-26 15:59
Modified
2024-11-21 02:21
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F99FC-A5C4-4858-9013-C88827660E20", "versionEndIncluding": "1.2.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D355450F-4354-4E0B-BA86-A6BCF0672E1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter." }, { "lang": "es", "value": "Vulnerabilidad de XSS en admin/install.php en MantisBT anterior a 1.2.19 y 1.3.x anterior a 1.3.0-beta.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro (1) admin_username o (2) admin_password." } ], "id": "CVE-2014-9571", "lastModified": "2024-11-21T02:21:09.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-26T15:59:10.550", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2015/q1/156" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100209" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/132cd6d0" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/6d47c047" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/view.php?id=17938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2015/q1/156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/132cd6d0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/6d47c047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/view.php?id=17938" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-10-22 14:55
Modified
2024-11-21 02:14
Severity ?
Summary
gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 | |
mantisbt | mantisbt | 1.2.7 | |
mantisbt | mantisbt | 1.2.8 | |
mantisbt | mantisbt | 1.2.9 | |
mantisbt | mantisbt | 1.2.10 | |
mantisbt | mantisbt | 1.2.11 | |
mantisbt | mantisbt | 1.2.12 | |
mantisbt | mantisbt | 1.2.13 | |
mantisbt | mantisbt | 1.2.14 | |
mantisbt | mantisbt | 1.2.15 | |
mantisbt | mantisbt | 1.2.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind." }, { "lang": "es", "value": "gpc_api.php en MantisBT 1.2.17 y anteriores permite a atacantes remotos evadir la autenticaci\u00f3n a trav\u00e9s de una contrase\u00f1a que empiece por un byte nulo, lo que provoca un bind no autenticado." } ], "id": "CVE-2014-6387", "lastModified": "2024-11-21T02:14:17.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-22T14:55:06.637", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17640" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/09/12/11" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/09/12/14" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/09/12/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/09/12/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-28 15:29
Modified
2024-11-21 02:26
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and later before 1.2.20.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/02/21/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/02/21/2 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1191130 | Issue Tracking, Patch, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/02/21/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/02/21/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1191130 | Issue Tracking, Patch, Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "F5F8FB8B-C009-4BF5-B3C3-142FFD0BD5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "5A2E2E1A-B240-476F-8247-67DFFF38D33C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and later before 1.2.20." }, { "lang": "es", "value": "Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) en MantisBT 1.2.13 y posteriores antes de la 1.2.20." } ], "id": "CVE-2015-2046", "lastModified": "2024-11-21T02:26:38.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-28T15:29:01.423", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191130" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-31 20:15
Modified
2024-11-21 01:50
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows remote attackers to inject arbitrary web script or HTML via a version, related to deleting a version.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | 1.2.14 | |
fedoraproject | fedora | 17 | |
fedoraproject | fedora | 18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows remote attackers to inject arbitrary web script or HTML via a version, related to deleting a version." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en MantisBT versi\u00f3n 1.2.14, permite a atacantes remotos inyectar script web o HTML arbitrario por medio de una versi\u00f3n, relacionada con la eliminaci\u00f3n de una versi\u00f3n." } ], "id": "CVE-2013-1931", "lastModified": "2024-11-21T01:50:42.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-31T20:15:10.427", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58889" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1931" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15511" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1931" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-20 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=24731 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=24731 | Exploit, Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A66315F-6772-4AD3-AEAC-B9A922DD44D3", "versionEndIncluding": "2.17.0", "versionStartIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en las p\u00e1ginas View Filters (view_filters_page.php) y Edit Filter (manage_filter_edit_page.php) en MantisBT versi\u00f3n 2.1.0 hasta 2.17.0, permite a los atacantes remotos inyectar c\u00f3digo arbitrario (si la configuraci\u00f3n CSP lo permite ) por medio de un PATH_INFO creado. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta del CVE-2018-13055." } ], "id": "CVE-2018-16514", "lastModified": "2024-11-21T03:52:53.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-20T14:15:10.813", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24731" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-30 18:29
Modified
2024-11-21 03:54
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the Manage Filters page (manage_filter_page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/613 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=24813 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/613 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=24813 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "742C49AD-3696-4B9D-8AAF-A1C6E0F44CEC", "versionEndIncluding": "2.17.1", "versionStartIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Manage Filters page (manage_filter_page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la p\u00e1gina Manage Filters (manage_filter_page.php) en MantisBT, desde la versi\u00f3n 2.1.0 hasta la 2.17.1, permite que los atacantes remotos (si los derechos de acceso lo permiten) inyecten c\u00f3digo arbitrario (si la configuraci\u00f3n CSP lo permite) mediante un nombre de proyecto manipulado." } ], "id": "CVE-2018-17782", "lastModified": "2024-11-21T03:54:57.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-30T18:29:00.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24813" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-09 03:15
Modified
2024-11-21 01:05
Severity ?
Summary
MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/113 | Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=11952 | Vendor Advisory | |
cve@mitre.org | https://security-tracker.debian.org/tracker/CVE-2009-2802 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/113 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=11952 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2009-2802 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB604C06-38FA-4BD1-9E71-42C8ABFECE96", "versionEndExcluding": "1.2.2", "versionStartIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks." }, { "lang": "es", "value": "MantisBT versiones 1.2.x anteriores a 1.2.2, maneja de manera no segura los archivos adjuntos y los tipos MIME. Una renderizaci\u00f3n arbitraria de archivos adjuntos en l\u00ednea podr\u00eda conllevar a un ataque de tipo cross-domain scripting u otros ataques del navegador." } ], "id": "CVE-2009-2802", "lastModified": "2024-11-21T01:05:46.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-09T03:15:10.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/113" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=11952" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-2802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=11952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-2802" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-29 07:15
Modified
2024-11-21 05:24
Severity ?
Summary
An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27357 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27728 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27357 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27728 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1E7F65F-C6A7-4052-8E14-4E285744207F", "versionEndExcluding": "2.24.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information." }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones anteriores a 2.24.4.\u0026#xa0;Una falta de comprobaci\u00f3n de acceso en el archivo bug_actiongroup.php permite a un atacante (con derechos para crear nuevos problemas) usar la acci\u00f3n del grupo COPY para crear un clon, incluyendo todas las notas de error y archivos adjuntos, de cualquier problema privado (es decir, uno que tenga el estado de la vista Privada, o pertenece a un Proyecto privado) por medio del par\u00e1metro bug_arr[].\u0026#xa0;Esto proporciona acceso completo a una informaci\u00f3n potencialmente confidencial" } ], "id": "CVE-2020-29604", "lastModified": "2024-11-21T05:24:18.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-29T07:15:17.873", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27728" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-06 19:29
Modified
2024-11-21 04:15
Severity ?
Summary
An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=24221 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=24221 | Exploit, Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F88B279-DEC2-47DA-ADBB-509EB0AB2431", "versionEndIncluding": "1.3.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B537D8BB-944B-4B92-B48D-0CA5A2D01372", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the \u0027m_id\u0027 parameter), any user with REPORTER access or above is able to view any private issue\u0027s details (summary, description, steps to reproduce, additional information) when cloning it. By checking the \u0027Copy issue notes\u0027 and \u0027Copy attachments\u0027 checkboxes and completing the clone operation, this data also becomes public (except private notes)." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en MantisBT a trav\u00e9s de 1.3.14 y 2.0.0. Al usar una solicitud dise\u00f1ada en bug_report_page.php (modificando el par\u00e1metro \u0027m_id\u0027), cualquier usuario con acceso a REPORTER o superior puede ver los detalles de cualquier problema privado (resumen, descripci\u00f3n, pasos para reproducir, informaci\u00f3n adicional) al clonarlo. Al marcar las casillas de verificaci\u00f3n \u0027Copiar notas de emisi\u00f3n\u0027 y \u0027Copiar adjuntos\u0027 y completar la operaci\u00f3n de clonaci\u00f3n, estos datos tambi\u00e9n se vuelven p\u00fablicos (excepto las notas privadas)." } ], "id": "CVE-2018-9839", "lastModified": "2024-11-21T04:15:46.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-06T19:29:00.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24221" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-27 14:55
Modified
2024-11-21 01:50
Severity ?
Summary
Mantis Bug Tracker (aka MantisBT) 1.2.12 before 1.2.15 allows remote attackers to cause a denial of service (resource consumption) via a filter using a criteria, text search, and the "any condition" match type.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mantis Bug Tracker (aka MantisBT) 1.2.12 before 1.2.15 allows remote attackers to cause a denial of service (resource consumption) via a filter using a criteria, text search, and the \"any condition\" match type." }, { "lang": "es", "value": "Mantis Bug Tracker (tambi\u00e9n conocido como MantisBT) 1.2.12 anterior a 1.2.15 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de un filtro que utiliza un criterio, b\u00fasqueda de texto y el tipo de coincidencia \u0027cualquier condici\u00f3n\u0027." } ], "id": "CVE-2013-1883", "lastModified": "2024-11-21T01:50:34.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-27T14:55:04.073", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15573" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/03/22/2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/58626" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=924340" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83347" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/d16988c3ca232a7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/03/22/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/58626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=924340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/d16988c3ca232a7" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-20 16:55
Modified
2024-11-21 02:04
Severity ?
Summary
Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 | |
mantisbt | mantisbt | 1.2.7 | |
mantisbt | mantisbt | 1.2.8 | |
mantisbt | mantisbt | 1.2.9 | |
mantisbt | mantisbt | 1.2.10 | |
mantisbt | mantisbt | 1.2.11 | |
mantisbt | mantisbt | 1.2.13 | |
mantisbt | mantisbt | 1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED59DEDF-08A2-4BEB-9DE3-0205CA2D69B4", "versionEndIncluding": "1.2.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en MantisBT anterior a 1.2.16 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de par\u00e1metros no especificados hacia (1) la funci\u00f3n mc_project_get_attachments en api/soap/mc_project_api.php; (2) la funci\u00f3n news_get_limited_rows en core/news_api.php; la funci\u00f3n (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter o (7) summary_print_by_category en core/summary_api.php; la funci\u00f3n (8) create_bug_enum_summary o (9) enum_bug_group en plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php o (11) bug_graph_bystatus.php en plugins/MantisGraph/pages/ o (12) proj_doc_page.php, relacionado con el uso de la funci\u00f3n db_query, una vulnerabilidad diferente a CVE-2014-1608." } ], "id": "CVE-2014-1609", "lastModified": "2024-11-21T02:04:42.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-20T16:55:12.323", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/61432" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3030" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/65461" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-23 19:15
Modified
2024-11-21 07:44
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. This issue is fixed in version 2.25.6. There are no workarounds.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79 | Third Party Advisory | |
security-advisories@github.com | https://www.mantisbt.org/bugs/view.php?id=31086 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mantisbt.org/bugs/view.php?id=31086 | Exploit, Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9E044F9-FC0A-4E13-A9AF-98DAEB87C445", "versionEndExcluding": "2.25.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. This issue is fixed in version 2.25.6. There are no workarounds.\n" } ], "id": "CVE-2023-22476", "lastModified": "2024-11-21T07:44:52.960", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-23T19:15:13.110", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=31086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=31086" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-09 18:59
Modified
2024-11-21 02:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in file_download.php in MantisBT before 1.2.18 allows remote authenticated users to inject arbitrary web script or HTML via a Flash file with an image extension, related to inline attachments, as demonstrated by a .swf.jpeg filename.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.3 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.1.9 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 | |
mantisbt | mantisbt | 1.2.7 | |
mantisbt | mantisbt | 1.2.8 | |
mantisbt | mantisbt | 1.2.9 | |
mantisbt | mantisbt | 1.2.10 | |
mantisbt | mantisbt | 1.2.11 | |
mantisbt | mantisbt | 1.2.12 | |
mantisbt | mantisbt | 1.2.13 | |
mantisbt | mantisbt | 1.2.14 | |
mantisbt | mantisbt | 1.2.15 | |
mantisbt | mantisbt | 1.2.16 | |
mantisbt | mantisbt | 1.2.17 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in file_download.php in MantisBT before 1.2.18 allows remote authenticated users to inject arbitrary web script or HTML via a Flash file with an image extension, related to inline attachments, as demonstrated by a .swf.jpeg filename." }, { "lang": "es", "value": "Vulnerabilidad de XSS en file_download.php en MantisBT anterior a 1.2.18 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un fichero Flash con un extensi\u00f3n de imagen, relacionado con adjuntos de l\u00ednea interior (inline), tal y como fue demostrado por un nombre de fichero .swf.jpeg." } ], "id": "CVE-2014-9271", "lastModified": "2024-11-21T02:20:31.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-01-09T18:59:02.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17874" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-11 21:59
Modified
2024-11-21 02:21
Severity ?
Summary
Incomplete blacklist vulnerability in the config_is_private function in config_api.php in MantisBT 1.3.x before 1.3.0 allows remote attackers to obtain sensitive master salt configuration information via a SOAP API request.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C22EBC7C-093F-4641-A5DE-E63DD9C0F2BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in the config_is_private function in config_api.php in MantisBT 1.3.x before 1.3.0 allows remote attackers to obtain sensitive master salt configuration information via a SOAP API request." }, { "lang": "es", "value": "Vulnerabilidad de lista negra incompleta en la funci\u00f3n config_is_private en config_api.php en MantisBT 1.3.x en versiones anteriores a 1.3.0 permite a atacantes remotos obtener informaci\u00f3n sensible de la configuraci\u00f3n de la salt maestra a trav\u00e9s de una petici\u00f3n API SOAP." } ], "id": "CVE-2014-9759", "lastModified": "2024-11-21T02:21:36.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-11T21:59:00.163", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/p/mantisbt/mailman/message/32948048/" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2016/01/02/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2016/01/03/2" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1035518" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://mantisbt.org/bugs/view.php?id=20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/p/mantisbt/mailman/message/32948048/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/01/02/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/01/03/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://mantisbt.org/bugs/view.php?id=20277" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-18 15:59
Modified
2024-11-21 02:19
Severity ?
Summary
The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code." }, { "lang": "es", "value": "El plugin XML Import/Export en MantisBT 1.2.x no restringe el acceso, lo que permite a atacantes remotos (1) subir c\u00f3digo XML arbitrario mediante la p\u00e1gina \u0027import\u0027 o (2) obtener informaci\u00f3n sensible mediante la p\u00e1gina \u0027export\u0027. NOTA: este fallo puede ser combinado con la CVE-2014-7146 y ejecutar c\u00f3digo PHP arbitrario." } ], "id": "CVE-2014-8598", "lastModified": "2024-11-21T02:19:24.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-18T15:59:06.750", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17780" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/07/28" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70996" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98573" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/80a15487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/07/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/80a15487" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-22 05:59
Modified
2024-11-21 03:31
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in MantisBT before 2.1.1 allows remote attackers to inject arbitrary HTML or JavaScript (if MantisBT's CSP settings permit it) by modifying 'window_title' in the application configuration. This requires privileged access to MantisBT configuration management pages (i.e., administrator access rights) or altering the system configuration file (config_inc.php).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=22266 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=22266 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA2146F9-1E6B-4EA0-AFCD-467312D36F5B", "versionEndIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in MantisBT before 2.1.1 allows remote attackers to inject arbitrary HTML or JavaScript (if MantisBT\u0027s CSP settings permit it) by modifying \u0027window_title\u0027 in the application configuration. This requires privileged access to MantisBT configuration management pages (i.e., administrator access rights) or altering the system configuration file (config_inc.php)." }, { "lang": "es", "value": "Vulnerabilidad de XSS en MantisBT en versiones anteriores a 2.1.1 permite a atacantes remotos inyectar c\u00f3digo HTML arbitrario o JavaScript (si los ajustes MantisBT\u0027s CSP lo permiten) modificando \u0027window_title\u0027 en la configuraci\u00f3n de la aplicaci\u00f3n. Esto requiere un acceso privilegiado a las p\u00e1ginas de gesti\u00f3n de configuraci\u00f3n de MantisBT (es decir, derechos de acceso de administrador) o alterar el archivo de configuraci\u00f3n del sistema (config_inc.php)." } ], "id": "CVE-2017-7222", "lastModified": "2024-11-21T03:31:24.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-22T05:59:00.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=22266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=22266" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-19 19:15
Modified
2024-11-21 04:28
Severity ?
Summary
The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document's page.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=26078 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=26078 | Permissions Required, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B2948D4-038D-4C4B-AFCB-00FA9301763A", "versionEndExcluding": "2.21.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document\u0027s page." }, { "lang": "es", "value": "La funcionalidad Project Documentation del archivo proj_doc_edit_page.php en MantisBT versiones anteriores a 2.21.3, presenta una vulnerabilidad de tipo cross-site scripting (XSS) almacenado, permitiendo una ejecuci\u00f3n de c\u00f3digo arbitrario (si la configuraci\u00f3n CSP lo permite) despu\u00e9s de cargar un archivo adjunto con un nombre de archivo dise\u00f1ado. El c\u00f3digo se ejecuta al editar la p\u00e1gina del documento." } ], "id": "CVE-2019-15539", "lastModified": "2024-11-21T04:28:57.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-19T19:15:11.693", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=26078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=26078" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-09 20:15
Modified
2024-11-21 04:29
Severity ?
Summary
MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "80B28CB3-6654-4C99-9F71-F00AAA332A3E", "versionEndExcluding": "1.3.20", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E44A680B-3086-4961-BC39-A3AD7BDBB1CB", "versionEndExcluding": "2.22.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution." }, { "lang": "es", "value": "MantisBT versiones anteriores a 1.3.20 y 2.22.1, permite la Inyecci\u00f3n de Comandos de Autenticaci\u00f3n Post, lo que conlleva a la Ejecuci\u00f3n de C\u00f3digo Remota." } ], "id": "CVE-2019-15715", "lastModified": "2024-11-21T04:29:18.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-09T20:15:23.207", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/changelog_page.php?project=mantisbt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=26091" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=26162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/changelog_page.php?project=mantisbt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=26091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=26162" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-09 18:59
Modified
2024-11-21 02:20
Severity ?
Summary
The string_insert_href function in MantisBT 1.2.0a1 through 1.2.x before 1.2.18 does not properly validate the URL protocol, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the javascript:// protocol.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.3 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.1.9 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 | |
mantisbt | mantisbt | 1.2.7 | |
mantisbt | mantisbt | 1.2.8 | |
mantisbt | mantisbt | 1.2.9 | |
mantisbt | mantisbt | 1.2.10 | |
mantisbt | mantisbt | 1.2.11 | |
mantisbt | mantisbt | 1.2.12 | |
mantisbt | mantisbt | 1.2.13 | |
mantisbt | mantisbt | 1.2.14 | |
mantisbt | mantisbt | 1.2.15 | |
mantisbt | mantisbt | 1.2.16 | |
mantisbt | mantisbt | 1.2.17 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The string_insert_href function in MantisBT 1.2.0a1 through 1.2.x before 1.2.18 does not properly validate the URL protocol, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the javascript:// protocol." }, { "lang": "es", "value": "La funci\u00f3n string_insert_href en MantisBT 1.2.0a1 hasta 1.2.x anterior a 1.2.18 no valida correctamente el protocolo de URLs, lo que permite a atacantes remotos realizar ataques de XSS a trav\u00e9s del protocolo javascript://." } ], "id": "CVE-2014-9272", "lastModified": "2024-11-21T02:20:31.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-09T18:59:03.553", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/05378e00" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/view.php?id=17297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/05378e00" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/view.php?id=17297" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-31 04:59
Modified
2024-11-21 03:31
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.mantisbt.org/bugs/view.php?id=22568 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/97253 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1038169 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mantisbt.org/bugs/view.php?id=22568 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97253 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038169 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | 1.2.16 | |
mantisbt | mantisbt | 1.2.17 | |
mantisbt | mantisbt | 1.2.18 | |
mantisbt | mantisbt | 1.2.19 | |
mantisbt | mantisbt | 1.2.20 | |
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.1 | |
mantisbt | mantisbt | 1.3.2 | |
mantisbt | mantisbt | 1.3.3 | |
mantisbt | mantisbt | 1.3.4 | |
mantisbt | mantisbt | 1.3.5 | |
mantisbt | mantisbt | 1.3.6 | |
mantisbt | mantisbt | 1.3.7 | |
mantisbt | mantisbt | 1.3.8 | |
mantisbt | mantisbt | 1.3.9 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.1 | |
mantisbt | mantisbt | 2.1.0 | |
mantisbt | mantisbt | 2.1.1 | |
mantisbt | mantisbt | 2.1.2 | |
mantisbt | mantisbt | 2.1.3 | |
mantisbt | mantisbt | 2.2.0 | |
mantisbt | mantisbt | 2.2.1 | |
mantisbt | mantisbt | 2.2.2 | |
mantisbt | mantisbt | 2.2.3 | |
mantisbt | mantisbt | 2.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "F5F8FB8B-C009-4BF5-B3C3-142FFD0BD5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "5A2E2E1A-B240-476F-8247-67DFFF38D33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "3990CAB4-003A-4B10-8516-303C87779C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D355450F-4354-4E0B-BA86-A6BCF0672E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "5171F015-E110-49CB-8A51-28E067C9B85D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "E1C1AFA6-D7C3-4A74-BBB8-2B7234BD03FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C22EBC7C-093F-4641-A5DE-E63DD9C0F2BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EC65E660-1F4A-4040-8C4D-197BD9081E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF8D4B34-E00E-4137-8695-6C9C74980DC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "62C8D0CC-FB77-43B5-8A50-7F5C462E9771", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "29B09C56-E71E-4272-A47E-9CC530EEEA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "7323557C-F23F-4A83-ADAD-889E3C8B0C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "11779871-2959-404C-A8A1-C35DACC3EC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6BB766F-D8E9-4D1A-A877-2BF75C1E0D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CDEDA19B-58F9-4416-AF6A-8F1639D665CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "26A1E879-1D21-418E-A72E-287C7E977714", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "C1519517-765C-4426-8C09-51EBD699EE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B537D8BB-944B-4B92-B48D-0CA5A2D01372", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "541BD5B7-9F88-4B6A-A9D5-3BB182661EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DBD43A80-1179-426B-AF21-AE8B29CA1E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "F39D6AB1-ECA5-4CE6-BBB3-570758AA715A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5202AE86-61A0-4146-BB18-5CD4F38A880C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0A2965D7-794C-4451-9DB7-B5561B5E3254", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "39492D12-1A13-43CE-84A7-F5CCFB87D612", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E6AF670-28C3-4D7E-9EB4-E0B366CE818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "021CC8F4-B310-4DBF-9D50-B8A357158E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D73E7205-12E1-4C57-A120-91C4C0760305", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "262EC0CC-0716-4AED-9255-13288A297879", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2550F1FD-5104-4BAA-80F6-C6202D7326B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDE5FC-B891-4ACA-BCAB-83EB9D49C91F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F89D994-7F93-4839-8A57-F4CD633576E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2154CE53-2DED-4023-96D5-515468E226B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "83C79C70-F6BE-485D-952A-44E5E9F16D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted \u0027type\u0027 parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the \"Post-installation and upgrade tasks\" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page." }, { "lang": "es", "value": "Una vulnerabilidad XSS en la p\u00e1gina MantisBT Move Attachments (move_attachments_page.php, parte de las herramientas de administraci\u00f3n) permite a atacantes remotos inyectar c\u00f3digo arbitrario mediante un par\u00e1metro \u0027type\u0027 manipulado si la configuraci\u00f3n de CSP lo permite. Esto se fija en 1.3.9, 2.1.3 y 2.2.3. Tenga en cuenta que esta vulnerabilidad no es explotable si se elimina el directorio de herramientas de administraci\u00f3n, como se recomienda en las \"Tareas posteriores a la instalaci\u00f3n y actualizaci\u00f3n\" de la gu\u00eda de administraci\u00f3n de MantisBT. Tambi\u00e9n se muestra un recordatorio para hacerlo en la p\u00e1gina de inicio de sesi\u00f3n." } ], "id": "CVE-2017-7241", "lastModified": "2024-11-21T03:31:27.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-31T04:59:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22568" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97253" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038169" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-18 15:59
Modified
2024-11-21 02:16
Severity ?
Summary
The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier." }, { "lang": "es", "value": "El plugin XmlImportExport en MantisBT 1.2.15 y versiones anteriores, permite a atacantes remotos ejecutar c\u00f3digo arbitrario PHP a mediante campos de descripci\u00f3n o modificaciones en el atributo issuelink en ficheros XML, que no es correctamente gestionada cuando se ejecuta la funci\u00f3n preg_replace con el modidicador." } ], "id": "CVE-2014-7146", "lastModified": "2024-11-21T02:16:25.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-18T15:59:02.500", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/576" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/bugs/view.php?id=17725" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70993" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98572" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/84017535" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/bed19db9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=17725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/84017535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/bed19db9" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-12 13:15
Modified
2024-11-21 05:07
Severity ?
Summary
An XSS issue was discovered in MantisBT before 2.24.2. Improper escaping on view_all_bug_page.php allows a remote attacker to inject arbitrary HTML into the page by saving it into a text Custom Field, leading to possible code execution in the browser of any user subsequently viewing the issue (if CSP settings allow it).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/665 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27056 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/665 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27056 | Exploit, Issue Tracking, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A66F9C7-671B-4C9B-8149-3FA37F428187", "versionEndExcluding": "2.24.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in MantisBT before 2.24.2. Improper escaping on view_all_bug_page.php allows a remote attacker to inject arbitrary HTML into the page by saving it into a text Custom Field, leading to possible code execution in the browser of any user subsequently viewing the issue (if CSP settings allow it)." }, { "lang": "es", "value": "Se detect\u00f3 un problema de tipo XSS en MantisBT versiones anteriores a 2.24.2. Un escape inapropiado en el archivo view_all_bug_page.php permite a un atacante remoto inyectar HTML arbitrario en la p\u00e1gina al guardarlo en un Campo Personalizado de texto, conllevando a una posible ejecuci\u00f3n de c\u00f3digo en el navegador de cualquier usuario visualizando el problema posteriormente (si la configuraci\u00f3n CSP lo permite)" } ], "id": "CVE-2020-16266", "lastModified": "2024-11-21T05:07:03.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-12T13:15:10.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/665" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27056" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-18 17:03
Modified
2024-11-21 02:04
Severity ?
Summary
SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 | |
mantisbt | mantisbt | 1.2.7 | |
mantisbt | mantisbt | 1.2.8 | |
mantisbt | mantisbt | 1.2.9 | |
mantisbt | mantisbt | 1.2.10 | |
mantisbt | mantisbt | 1.2.11 | |
mantisbt | mantisbt | 1.2.13 | |
mantisbt | mantisbt | 1.2.14 | |
debian | debian_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED59DEDF-08A2-4BEB-9DE3-0205CA2D69B4", "versionEndIncluding": "1.2.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n mci_file_get en api/soap/mc_file_api.php en MantisBT anterior a 1.2.16 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de una etiqueta envolvente manipulada en una solicitud mc_issue_attachment_get SOAP." } ], "id": "CVE-2014-1608", "lastModified": "2024-11-21T02:04:42.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-18T17:03:00.467", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/103118" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/61432" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3030" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/bugs/view.php?id=16879" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/65445" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/103118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=16879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-10 15:55
Modified
2024-11-21 01:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inject arbitrary web script or HTML via a project name.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inject arbitrary web script or HTML via a project name." }, { "lang": "es", "value": "Vulnerabilidad cross-site scripting (XSS) en account_sponsor_page.php de MantisBT 1.0.0 hasta 1.2.15 permite a usuarios remotos autenticados inyectar script web o HTML de forma arbitraria a trav\u00e9s de un nombre de proyecto." } ], "id": "CVE-2013-4460", "lastModified": "2024-11-21T01:55:36.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-01-10T15:55:03.773", "references": [ { "source": "secalert@redhat.com", "url": "http://osvdb.org/98823" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q4/168" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55305" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=16513" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/98823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q4/168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=16513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-16 22:15
Modified
2024-11-21 08:25
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2693D3D-D2B9-46EE-AB37-5D642D2F9600", "versionEndExcluding": "2.25.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects\u0027 names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`)." }, { "lang": "es", "value": "MantisBT es un rastreador de errores de c\u00f3digo abierto. Debido a comprobaciones insuficientes del nivel de acceso en la p\u00e1gina de redirecci\u00f3n Wiki, cualquier usuario puede revelar los nombres de los proyectos privados accediendo a wiki.php con ID incrementadas secuencialmente. Este problema se solucion\u00f3 en el commit \"65c44883f\" que se incluy\u00f3 en la versi\u00f3n \"2.258\". Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben desactivar la integraci\u00f3n wiki (`$g_wiki_enable = OFF;`)." } ], "id": "CVE-2023-44394", "lastModified": "2024-11-21T08:25:48.777", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-16T22:15:12.560", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=32981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=32981" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-17 03:41
Modified
2024-11-21 01:39
Severity ?
Summary
The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE1D8387-0DCB-476C-8789-561074548E01", "versionEndIncluding": "1.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request." }, { "lang": "es", "value": "La funci\u00f3n de mc_issue_note_update en la API SOAP en MantisBT anterior a v1.2.11 no comprueba correctamente los privilegios, lo que permite a atacantes remotos con privilegios de reporte de informes de errores editar bugnotes arbitrarios a trav\u00e9s de una solicitud SOAP." } ], "id": "CVE-2012-2691", "lastModified": "2024-11-21T01:39:27.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-17T03:41:41.857", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49414" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=14340" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53907" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/56467" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76180" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/175d973105fe9f03a37ced537b742611631067e0" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/edc8142bb8ac0ac0df1a3824d78c15f4015d959e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=14340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/175d973105fe9f03a37ced537b742611631067e0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/edc8142bb8ac0ac0df1a3824d78c15f4015d959e" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-29 07:15
Modified
2024-11-21 05:24
Severity ?
Summary
In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects' names via the manage_proj_edit_page.php project_id parameter, without having access to them.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27357 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27726 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27357 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27726 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1E7F65F-C6A7-4052-8E14-4E285744207F", "versionEndExcluding": "2.24.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects\u0027 names via the manage_proj_edit_page.php project_id parameter, without having access to them." }, { "lang": "es", "value": "En el archivo manage_proj_edit_page.php en MantisBT versiones anteriores a 2.24.4, cualquier usuario que haya iniciado sesi\u00f3n sin privilegios puede recuperar los nombres de los Proyectos Privados por medio del par\u00e1metro project_id del archivo manage_proj_edit_page.php, sin tener acceso a ellos" } ], "id": "CVE-2020-29603", "lastModified": "2024-11-21T05:24:17.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-29T07:15:17.810", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27726" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-922" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-05 22:00
Modified
2024-11-21 01:19
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.18.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0a1 | |
mantisbt | mantisbt | 0.19.0a2 | |
mantisbt | mantisbt | 0.19.1 | |
mantisbt | mantisbt | 0.19.2 | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 0.19.5 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0a1 | |
mantisbt | mantisbt | 1.0.0a2 | |
mantisbt | mantisbt | 1.0.0a3 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3C4D08-9733-4043-B006-560587335027", "versionEndIncluding": "1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en core/summary_api.php en MantisBT antes de la versi\u00f3n v1.2.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del campo de \u0027Summary\u0027. Se trata de un problema diferente al de CVE-2010-3303." } ], "id": "CVE-2010-3763", "lastModified": "2024-11-21T01:19:32.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-05T22:00:06.973", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42772" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/51199" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/bugs/view.php?id=12309" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43837" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0002" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-26 15:59
Modified
2024-11-21 02:21
Severity ?
Summary
SQL injection vulnerability in manage_user_page.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with FILE privileges to execute arbitrary SQL commands via the MANTIS_MANAGE_USERS_COOKIE cookie.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F99FC-A5C4-4858-9013-C88827660E20", "versionEndIncluding": "1.2.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D355450F-4354-4E0B-BA86-A6BCF0672E1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in manage_user_page.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with FILE privileges to execute arbitrary SQL commands via the MANTIS_MANAGE_USERS_COOKIE cookie." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en manage_user_page.php en MantisBT anterior a 1.2.19 y 1.3.x anterior a 1.3.0-beta.2 permite a administradores remotos con privilegios FILE ejecutar comandos SQL arbitrarios a trav\u00e9s de la cookie MANTIS_MANAGE_USERS_COOKIE." } ], "id": "CVE-2014-9573", "lastModified": "2024-11-21T02:21:09.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-26T15:59:12.597", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2015/q1/157" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100210" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/69c2d28d" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/7cc4539f" }, { "source": "cve@mitre.org", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2015/q1/157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/69c2d28d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/7cc4539f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17940" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-01 14:29
Modified
2024-11-21 02:32
Severity ?
Summary
The "Project Documentation" feature in MantisBT 1.2.19 and earlier, when the threshold to access files ($g_view_proj_doc_threshold) is set to ANYBODY, allows remote authenticated users to download attachments linked to arbitrary private projects via a file id number in the file_id parameter to file_download.php.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A815259-BA9C-4040-9E81-E8961F0716CA", "versionEndIncluding": "1.2.19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The \"Project Documentation\" feature in MantisBT 1.2.19 and earlier, when the threshold to access files ($g_view_proj_doc_threshold) is set to ANYBODY, allows remote authenticated users to download attachments linked to arbitrary private projects via a file id number in the file_id parameter to file_download.php." }, { "lang": "es", "value": "En caso de que el nivel de permiso para acceder a los archivos ($g_view_proj_doc_threshold) se establezca en ANYBODY, la caracter\u00edstica \"Project Documentation\" en las versiones 1.2.19 y anteriores de MantisBT permite a usuarios remotos autenticados descargar adjuntos enlazados con proyectos privados arbitrarios, utilizando un identificador de archivo en el par\u00e1metro file_id al file_download.php." } ], "id": "CVE-2015-5059", "lastModified": "2024-11-21T02:32:14.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-01T14:29:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163191.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/3" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75414" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237199" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163191.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-30 21:15
Modified
2024-11-21 05:18
Severity ?
Summary
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27304 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27304 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAC99001-43F4-461D-9C3A-AB33CA4B9F94", "versionEndExcluding": "2.24.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field\u0027s name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php." }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones anteriores a 2.24.3.\u0026#xa0;Un escape inapropiado de un nombre de campo personalizado permite a un atacante inyectar HTML y, si la configuraci\u00f3n de CSP lo permite, lograr una ejecuci\u00f3n de JavaScript arbitrario cuando intenta actualizar dicho campo personalizado por medio del archivo bug_actiongroup_page.php" } ], "id": "CVE-2020-25830", "lastModified": "2024-11-21T05:18:51.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-30T21:15:13.293", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-22 03:15
Modified
2024-11-21 05:27
Severity ?
Summary
An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27768 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27768 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E950A3D7-81CE-402A-A35B-46A472F96F1C", "versionEndIncluding": "2.24.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings." }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones hasta 2.24.3.\u0026#xa0;En la llamada de helper_ensure_confirmed en el archivo manage_custom_field_update.php, el nombre del campo personalizado no es saneado.\u0026#xa0;Esto puede ser problem\u00e1tico dependiendo de la configuraci\u00f3n de CSP" } ], "id": "CVE-2020-35571", "lastModified": "2024-11-21T05:27:36.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-22T03:15:14.183", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27768" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2024-11-21 02:20
Severity ?
Summary
MantisBT before 1.2.18 allows remote authenticated users to bypass the $g_download_attachments_threshold and $g_view_attachments_threshold restrictions and read attachments for private projects by leveraging access to a project that does not restrict access to attachments and a request to the download URL.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.18 allows remote authenticated users to bypass the $g_download_attachments_threshold and $g_view_attachments_threshold restrictions and read attachments for private projects by leveraging access to a project that does not restrict access to attachments and a request to the download URL." }, { "lang": "es", "value": "MantisBT anterior a 1.2.18 permite a usuarios remotos autenticados evadir las restricciones $g_download_attachments_threshold y $g_view_attachments_threshold y leer adjuntos para proyectos privados mediante el aprovechamiento del acceso a un proyecto que no restringe el acceso y una solicitud a la URL de descarga." } ], "id": "CVE-2014-8988", "lastModified": "2024-11-21T02:20:02.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:14.373", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/693" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/bugs/view.php?id=17742" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/6" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71104" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98731" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/5f0b150b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=17742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/5f0b150b" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-09-24 11:42
Modified
2024-11-21 00:48
Severity ?
Summary
Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "5875D457-28EF-4076-8E04-60CF9CF6D27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "301F44D1-21E7-4E00-BF45-2190D1FE21FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie." }, { "lang": "es", "value": "Mantis versiones 1.1.x hasta 1.1.2 y versiones 1.2.x hasta 1.2.0a2, no establece el flag de seguridad para la cookie de sesi\u00f3n en https, lo que puede causar que la cookie se env\u00ede en peticiones http y haga mas f\u00e1cil para los atacantes remotos la captura esta cookie." } ], "id": "CVE-2008-3102", "lastModified": "2024-11-21T00:48:25.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-24T11:42:25.233", "references": [ { "source": "cve@mitre.org", "url": "http://int21.de/cve/CVE-2008-3102-mantis.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32243" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32330" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32975" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4298" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496625/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496684/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31344" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45395" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00504.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00648.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://int21.de/cve/CVE-2008-3102-mantis.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496625/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496684/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00504.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00648.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-05 15:29
Modified
2024-11-21 03:09
Severity ?
Summary
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/100142 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100142 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "146401B2-FDE4-4ACC-9CFA-E7BEE11D1FCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "matchCriteriaId": "2177DDD2-8830-4838-9945-0368DBDD1815", "vulnerable": false }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA450156-3EEF-4F22-8F28-2E0A55C81FF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server." }, { "lang": "es", "value": "Si tras la correcta instalaci\u00f3n de MantisBT en su versi\u00f3n 2.5.2 en MySQL/MariaDB el administrador no elimina el directorio \"admin\" (tal y como se recomienda en la secci\u00f3n \"Post-installation and upgrade tasks\" de la MantisBT Admin Guide) y el cliente MySQL tiene una configuraci\u00f3n local_infile habilitada (en php.ini mysqli.allow_local_infile o el archivo de configuraci\u00f3n del cliente MySQL, dependiendo de la configuraci\u00f3n de PHP), un atacante podr\u00eda aprovecharse de la funcionalidad \"connect file read\" de MySQL para acceder de forma remota a los archivos del servidor de MantisBT." } ], "id": "CVE-2017-12419", "lastModified": "2024-11-21T03:09:26.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-05T15:29:00.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100142" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-31 04:59
Modified
2024-11-21 03:31
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted 'config_option' parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.mantisbt.org/bugs/view.php?id=22579 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/97251 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1038169 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mantisbt.org/bugs/view.php?id=22579 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97251 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038169 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.1 | |
mantisbt | mantisbt | 1.3.2 | |
mantisbt | mantisbt | 1.3.3 | |
mantisbt | mantisbt | 1.3.4 | |
mantisbt | mantisbt | 1.3.5 | |
mantisbt | mantisbt | 1.3.6 | |
mantisbt | mantisbt | 1.3.7 | |
mantisbt | mantisbt | 1.3.8 | |
mantisbt | mantisbt | 1.3.9 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.1 | |
mantisbt | mantisbt | 2.1.0 | |
mantisbt | mantisbt | 2.1.1 | |
mantisbt | mantisbt | 2.1.2 | |
mantisbt | mantisbt | 2.1.3 | |
mantisbt | mantisbt | 2.2.0 | |
mantisbt | mantisbt | 2.2.1 | |
mantisbt | mantisbt | 2.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EC65E660-1F4A-4040-8C4D-197BD9081E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF8D4B34-E00E-4137-8695-6C9C74980DC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "62C8D0CC-FB77-43B5-8A50-7F5C462E9771", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "29B09C56-E71E-4272-A47E-9CC530EEEA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "7323557C-F23F-4A83-ADAD-889E3C8B0C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "11779871-2959-404C-A8A1-C35DACC3EC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6BB766F-D8E9-4D1A-A877-2BF75C1E0D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CDEDA19B-58F9-4416-AF6A-8F1639D665CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "26A1E879-1D21-418E-A72E-287C7E977714", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "C1519517-765C-4426-8C09-51EBD699EE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B537D8BB-944B-4B92-B48D-0CA5A2D01372", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "541BD5B7-9F88-4B6A-A9D5-3BB182661EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DBD43A80-1179-426B-AF21-AE8B29CA1E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "F39D6AB1-ECA5-4CE6-BBB3-570758AA715A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5202AE86-61A0-4146-BB18-5CD4F38A880C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0A2965D7-794C-4451-9DB7-B5561B5E3254", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "39492D12-1A13-43CE-84A7-F5CCFB87D612", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E6AF670-28C3-4D7E-9EB4-E0B366CE818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "021CC8F4-B310-4DBF-9D50-B8A357158E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D73E7205-12E1-4C57-A120-91C4C0760305", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "262EC0CC-0716-4AED-9255-13288A297879", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2550F1FD-5104-4BAA-80F6-C6202D7326B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDE5FC-B891-4ACA-BCAB-83EB9D49C91F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F89D994-7F93-4839-8A57-F4CD633576E8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted \u0027config_option\u0027 parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3." }, { "lang": "es", "value": "Una vulnerabilidad XSS en la p\u00e1gina informe de configuraci\u00f3n de MantisBT (adm_config_report.php) permite a atacantes remotos inyectar c\u00f3digo arbitrario (si la configuraci\u00f3n de CSP lo permite) mediante un par\u00e1metro \u0027config_option\u0027 manipulado. Esto se fija en 1.3.9, 2.1.3 y 2.2.3." } ], "id": "CVE-2017-7309", "lastModified": "2024-11-21T03:31:36.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-31T04:59:00.283", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22579" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97251" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038169" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-08 16:59
Modified
2024-11-21 02:20
Severity ?
Summary
The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL." }, { "lang": "es", "value": "La funci\u00f3n print_test_result en admin/upgrade_unattended.php en MantisBT 1.1.0a3 hasta 1.2.x anterior a 1.2.18 permite a atacantes remotos obtener las credenciales de la base de datos a trav\u00e9s de una URL en el par\u00e1metro hostname y la lectura de los par\u00e1metros en la respuesta enviada a la URL." } ], "id": "CVE-2014-9279", "lastModified": "2024-11-21T02:20:32.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-08T16:59:12.917", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/863" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17877" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71359" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99031" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/0826cef8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/0826cef8" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-30 18:29
Modified
2024-11-21 03:54
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the Edit Filter page (manage_filter_edit page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/613 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=24814 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/613 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=24814 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "742C49AD-3696-4B9D-8AAF-A1C6E0F44CEC", "versionEndIncluding": "2.17.1", "versionStartIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Edit Filter page (manage_filter_edit page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la p\u00e1gina Edit Filter (manage_filter_edit page.php) en MantisBT, desde la versi\u00f3n 2.1.0 hasta la 2.17.1, permite que los atacantes remotos (si los derechos de acceso lo permiten) inyecten c\u00f3digo arbitrario (si la configuraci\u00f3n CSP lo permite) mediante un nombre de proyecto manipulado." } ], "id": "CVE-2018-17783", "lastModified": "2024-11-21T03:54:58.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-30T18:29:00.673", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24814" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-14 20:15
Modified
2024-11-21 06:28
Severity ?
Summary
Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e | Patch, Third Party Advisory | |
cve@mitre.org | https://www.mantisbt.org/bugs/view.php?id=29130 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mantisbt.org/bugs/view.php?id=29130 | Exploit, Issue Tracking, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C85731-06A6-4482-8961-87C1DF556A69", "versionEndExcluding": "2.25.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel." }, { "lang": "es", "value": "Una falta de neutralizaci\u00f3n de elementos de f\u00f3rmula en la API CSV de MantisBT versiones anteriores a 2.25.3 permite que un atacante no privilegiado ejecute c\u00f3digo u obtenga acceso a informaci\u00f3n cuando un usuario abre el archivo CSV generado por csv_export.php en Excel" } ], "id": "CVE-2021-43257", "lastModified": "2024-11-21T06:28:56.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-14T20:15:09.157", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=29130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=29130" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1236" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-30 19:15
Modified
2024-11-21 05:28
Severity ?
Summary
An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27370 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27370 | Exploit, Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1E7F65F-C6A7-4052-8E14-4E285744207F", "versionEndExcluding": "2.24.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter." }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones anteriores a 2.24.4.\u0026#xa0;Una comprobaci\u00f3n incorrecta de acceso en el archivo bug_revision_view_page.php permite a un atacante poco privilegiado visualizar el campo Summary de problemas privados, as\u00ed como revisiones de notas de bug, consiguiendo acceso a informaci\u00f3n potencialmente confidencial por medio del par\u00e1metro bugnote_id." } ], "id": "CVE-2020-35849", "lastModified": "2024-11-21T05:28:18.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-30T19:15:13.903", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27370" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-21 16:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E421063A-47DD-4307-AB38-331301A1DC6C", "versionEndIncluding": "1.2.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en bug_actiongroup_ext_page.php en MantisBT antes de 1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro action, relacionado con bug_actiongroup_page.php, una vulnerabilidad diferente de CVE-2011-3357" } ], "id": "CVE-2011-3578", "lastModified": "2024-11-21T01:30:47.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-09-21T16:55:05.240", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45961" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/51199" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8392" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-02 09:29
Modified
2024-11-21 04:10
Severity ?
Summary
view_all_bug_page.php in MantisBT 2.10.0-development before 2018-02-02 allows remote attackers to discover the full path via an invalid filter parameter, related to a filter_ensure_valid_filter call in current_user_api.php.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "4881974A-70D0-483D-A265-A22327045876", "versionEndIncluding": "2.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "view_all_bug_page.php in MantisBT 2.10.0-development before 2018-02-02 allows remote attackers to discover the full path via an invalid filter parameter, related to a filter_ensure_valid_filter call in current_user_api.php." }, { "lang": "es", "value": "En el archivo view_all_bug_page.php en MantisBT versi\u00f3n 2.10.0-desarrollo antes del 02-02-2018, permite a los atacantes remotos detectar la path completa por medio de un par\u00e1metro filter no v\u00e1lido, relacionado con una llamada a la funci\u00f3n filter_ensure_valid_filter en el archivo current_user_api.php." } ], "id": "CVE-2018-6526", "lastModified": "2024-11-21T04:10:50.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-02T09:29:00.320", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103065" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23921" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-30 21:15
Modified
2024-11-21 05:18
Severity ?
Summary
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93 | Patch, Third Party Advisory | |
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27039 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27039 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAC99001-43F4-461D-9C3A-AB33CA4B9F94", "versionEndExcluding": "2.24.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el archivo file_download.php en MantisBT versiones anteriores a 2.24.3.\u0026#xa0;Los usuarios sin acceso para visualizar notas de problemas privados pueden descargar los archivos adjuntos (supuestamente privados) vinculados a estas notas al acceder directamente a la URL de descarga de archivo correspondiente" } ], "id": "CVE-2020-25781", "lastModified": "2024-11-21T05:18:45.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-30T21:15:13.230", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27039" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-07 20:15
Modified
2024-11-21 01:03
Severity ?
Summary
An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=11296 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27976 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=11296 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27976 | Exploit, Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8527F3A-9A9B-47FF-AAE6-2BC22AD9508C", "versionEndExcluding": "2.24.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user\u0027s cookie to login as them." }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones anteriores a 2.24.5.\u0026#xa0;Asocia una cadena de cookies \u00fanica con cada usuario.\u0026#xa0;Esta cadena no se restablece al cerrar la sesi\u00f3n (es decir, la sesi\u00f3n del usuario a\u00fan se considera v\u00e1lida y activa), lo que permite que un atacante que de alguna manera obtuvo acceso a la cookie de un usuario inicie sesi\u00f3n como \u00e9l" } ], "id": "CVE-2009-20001", "lastModified": "2024-11-21T01:03:53.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-07T20:15:12.427", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=11296" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=11296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27976" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:36
Severity ?
Summary
The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "79367D94-9665-49D7-94E4-CC9EFC7439BB", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "5875D457-28EF-4076-8E04-60CF9CF6D27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "301F44D1-21E7-4E00-BF45-2190D1FE21FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports." }, { "lang": "es", "value": "La funci\u00f3n access_has_bug_level de core/access_api.php de MantisBT anteriores a 1.2.9 no restringe el acceso apropiadamente si private_bug_view_threshold es configurado a un array, lo que permite a atacantes remotos evitar las restricciones previstas y realizar determinadas acciones en reportes de bug privados." } ], "id": "CVE-2012-1118", "lastModified": "2024-11-21T01:36:28.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:02.860", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=10124" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=10124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-03 20:00
Modified
2024-11-21 01:20
Severity ?
Summary
admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.18.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0a1 | |
mantisbt | mantisbt | 0.19.0a2 | |
mantisbt | mantisbt | 0.19.1 | |
mantisbt | mantisbt | 0.19.2 | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 0.19.5 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0a1 | |
mantisbt | mantisbt | 1.0.0a2 | |
mantisbt | mantisbt | 1.0.0a3 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB90875A-388F-493C-8076-F59EA12F9355", "versionEndIncluding": "1.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP." }, { "lang": "es", "value": "admin / upgrade_unattended.php en MantisBT anterior a v1.2.4 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de un par\u00e1metro db_type no v\u00e1lido, lo cual revela la ruta de instalaci\u00f3n en un mensaje de error, relacionado con una llamada insegura por MantisBT a una funci\u00f3n en la Biblioteca ADOdb para PHP ." } ], "id": "CVE-2010-4349", "lastModified": "2024-11-21T01:20:45.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-03T20:00:43.013", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42772" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-05 16:37
Modified
2024-11-21 02:05
Severity ?
Summary
SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en la p\u00e1gina \"manage configuration\" (adm_config_report.php) en MantisBT 1.2.13 hasta 1.2.16 permite a administradores remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro filter_config_id." } ], "id": "CVE-2014-2238", "lastModified": "2024-11-21T02:05:54.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-05T16:37:41.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://mantisbt.domainunion.de/bugs/view.php?id=17055" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q1/456" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seclists.org/oss-sec/2014/q1/490" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/blog/?p=288" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/65903" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://mantisbt.domainunion.de/bugs/view.php?id=17055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q1/456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seclists.org/oss-sec/2014/q1/490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/blog/?p=288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/65903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91563" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-01-10 15:59
Modified
2024-11-21 02:56
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT Filter API in MantisBT versions before 1.2.19, and versions 2.0.0-beta1, 1.3.0-beta1 allows remote attackers to inject arbitrary web script or HTML via the 'view_type' parameter.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/92522 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1036655 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e | Patch, Vendor Advisory | |
secalert@redhat.com | https://mantisbt.org/bugs/view.php?id=21611 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92522 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036655 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=21611 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F99FC-A5C4-4858-9013-C88827660E20", "versionEndIncluding": "1.2.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D355450F-4354-4E0B-BA86-A6BCF0672E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "541BD5B7-9F88-4B6A-A9D5-3BB182661EC8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT Filter API in MantisBT versions before 1.2.19, and versions 2.0.0-beta1, 1.3.0-beta1 allows remote attackers to inject arbitrary web script or HTML via the \u0027view_type\u0027 parameter." }, { "lang": "es", "value": "Vulnerabilidad de XSS en MantisBT Filter API en MantisBT en versiones anteriores a 1.2.19 y versiones 2.0.0-beta1, 1.3.0-beta1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro \u0027view_type\u0027." } ], "id": "CVE-2016-6837", "lastModified": "2024-11-21T02:56:55.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-10T15:59:00.500", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92522" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036655" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=21611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=21611" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-15 14:55
Modified
2024-11-21 01:47
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the filter_draw_selection_area2 function in core/filter_api.php in MantisBT 1.2.12 before 1.2.13 allows remote attackers to inject arbitrary web script or HTML via the match_type parameter to bugs/search.php.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the filter_draw_selection_area2 function in core/filter_api.php in MantisBT 1.2.12 before 1.2.13 allows remote attackers to inject arbitrary web script or HTML via the match_type parameter to bugs/search.php." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la funci\u00f3n filter_draw_selection_area2 en core/filter_api.php en MantisBT 1.2.12 anterior a 1.2.13 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro match_type hacia bugs/search.php." } ], "id": "CVE-2013-0197", "lastModified": "2024-11-21T01:47:02.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-05-15T14:55:06.653", "references": [ { "source": "secalert@redhat.com", "url": "http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q1/118" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q1/125" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2013/q1/140" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51853" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=15373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q1/118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q1/125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2013/q1/140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=15373" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-04 14:15
Modified
2024-11-21 06:57
Severity ?
Summary
An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability | Exploit, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/ | Vendor Advisory | |
cve@mitre.org | https://sourceforge.net/projects/mantisbt/ | Product, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sourceforge.net/projects/mantisbt/ | Product, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D5FBFB-2BD0-4AA2-BA0E-33F43D61ACA6", "versionEndExcluding": "2.25.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field." }, { "lang": "es", "value": "Se ha detectado un problema de tipo XSS en el archivo browser_search_plugin.php en MantisBT versiones anteriores a 2.25.2. La salida sin esconder del par\u00e1metro return permite a un atacante inyectar c\u00f3digo en un campo de entrada oculto" } ], "id": "CVE-2022-28508", "lastModified": "2024-11-21T06:57:27.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-04T14:15:09.050", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://sourceforge.net/projects/mantisbt/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://sourceforge.net/projects/mantisbt/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2024-11-21 02:54
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A815259-BA9C-4040-9E81-E8961F0716CA", "versionEndIncluding": "1.2.19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter." }, { "lang": "es", "value": "Vulnerabilidad de XSS en manage_custom_field_edit_page.php en MantisBT 1.2.19 y versiones anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro return." } ], "id": "CVE-2016-5364", "lastModified": "2024-11-21T02:54:11.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:00.763", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/11/5" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=20956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/11/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=20956" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-09 23:59
Modified
2024-11-21 02:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field." }, { "lang": "es", "value": "Vulnerabilidad de XSS en admin/copy_field.php en MantisBT anterior a 1.2.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del campo dest_id." } ], "id": "CVE-2014-9281", "lastModified": "2024-11-21T02:20:33.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-12-09T23:59:12.083", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/913" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71371" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99038" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/e5fc835a" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/view.php?id=17876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/e5fc835a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/view.php?id=17876" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-31 20:15
Modified
2024-11-21 01:50
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via a project name.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via a project name." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en la p\u00e1gina de reporte de la configuraci\u00f3n (archivo adm_config_report.php) en MantisBT versi\u00f3n 1.2.13, permite a usuarios autenticados remotos inyectar script web o HTML arbitrario por medio de un nombre de proyecto." } ], "id": "CVE-2013-1932", "lastModified": "2024-11-21T01:50:42.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-31T20:15:10.507", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58893" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1932" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15415" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1932" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-01 15:29
Modified
2024-11-21 03:08
Severity ?
Summary
An XSS issue was discovered in manage_user_page.php in MantisBT 2.x before 2.5.2. The 'filter' field is not sanitized before being rendered in the Manage User page, allowing remote attackers to execute arbitrary JavaScript code if CSP is disabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | 2.1.0 | |
mantisbt | mantisbt | 2.1.1 | |
mantisbt | mantisbt | 2.1.2 | |
mantisbt | mantisbt | 2.1.3 | |
mantisbt | mantisbt | 2.2.0 | |
mantisbt | mantisbt | 2.2.1 | |
mantisbt | mantisbt | 2.2.2 | |
mantisbt | mantisbt | 2.2.3 | |
mantisbt | mantisbt | 2.2.4 | |
mantisbt | mantisbt | 2.3.0 | |
mantisbt | mantisbt | 2.3.1 | |
mantisbt | mantisbt | 2.3.2 | |
mantisbt | mantisbt | 2.3.3 | |
mantisbt | mantisbt | 2.4.0 | |
mantisbt | mantisbt | 2.4.1 | |
mantisbt | mantisbt | 2.4.2 | |
mantisbt | mantisbt | 2.5.0 | |
mantisbt | mantisbt | 2.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E6AF670-28C3-4D7E-9EB4-E0B366CE818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "021CC8F4-B310-4DBF-9D50-B8A357158E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D73E7205-12E1-4C57-A120-91C4C0760305", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "262EC0CC-0716-4AED-9255-13288A297879", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2550F1FD-5104-4BAA-80F6-C6202D7326B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDE5FC-B891-4ACA-BCAB-83EB9D49C91F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F89D994-7F93-4839-8A57-F4CD633576E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2154CE53-2DED-4023-96D5-515468E226B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "CFF4779C-8E14-4CB1-BCB4-80F4C5020629", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "83C79C70-F6BE-485D-952A-44E5E9F16D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B5AE145-E1B4-40EF-A3B8-A13C114D3D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A77FD43E-A573-408F-A566-0959DAF442AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "CCB5C9D9-8EC1-46C7-BB09-84ED20E6E61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9258FCA1-6948-4DFE-BE50-5A39B5A64120", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4582B6DC-A625-41B2-ABF8-CF3BCF90A590", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F06B9BB-77DF-4185-A496-88DA8DABDDB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE637AB4-0E47-4063-8CFF-F163A27D7F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "75EE73EE-2A07-48BE-B7B9-C21643EC25B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in manage_user_page.php in MantisBT 2.x before 2.5.2. The \u0027filter\u0027 field is not sanitized before being rendered in the Manage User page, allowing remote attackers to execute arbitrary JavaScript code if CSP is disabled." }, { "lang": "es", "value": "Se detect\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) en manage_user_page.php en MantisBT en sus versiones 2.X anteriores a la 2.5.2. El campo \"filter\" no se sanitiza antes de que se renderice en la p\u00e1gina Manage User, permitiendo a los atacantes remotos ejecutar c\u00f3digo JavaScript arbitrario si se deshabilita la pol\u00edtica de seguridad de contenido (CSP)." } ], "id": "CVE-2017-12062", "lastModified": "2024-11-21T03:08:45.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-01T15:29:00.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039030" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23166" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-24 17:15
Modified
2024-11-21 07:08
Severity ?
Summary
An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/719 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=29135 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=30384 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/719 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=29135 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=30384 | Exploit, Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AA8F036-6C82-49EA-A458-B49E74C0BF9C", "versionEndExcluding": "2.25.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute." }, { "lang": "es", "value": "Una vulnerabilidad de tipo XSS en MantisBT versiones anteriores a 2.25.5, permite a atacantes remotos adjuntar documentos SVG dise\u00f1ados para emitir informes o notas de error. Cuando un usuario o un administrador hace clic en el archivo adjunto, file_download.php abre el documento SVG en una pesta\u00f1a del navegador en lugar de descargarlo como archivo, causando una ejecuci\u00f3n del c\u00f3digo JavaScript" } ], "id": "CVE-2022-33910", "lastModified": "2024-11-21T07:08:35.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-24T17:15:08.850", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/719" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=29135" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=30384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/719" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=29135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=30384" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-16 00:55
Modified
2024-11-21 01:44
Severity ?
Summary
core/email_api.php in MantisBT before 1.2.12 does not properly manage the sending of e-mail notifications about restricted bugs, which might allow remote authenticated users to obtain sensitive information by adding a note to a bug before losing permission to view that bug.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF1B52BB-9CDA-4676-A922-1EFBA1DF35CD", "versionEndIncluding": "1.2.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "core/email_api.php in MantisBT before 1.2.12 does not properly manage the sending of e-mail notifications about restricted bugs, which might allow remote authenticated users to obtain sensitive information by adding a note to a bug before losing permission to view that bug." }, { "lang": "es", "value": "core/email_api.php en MantisBT antes de v1.2.12 no gestiona adecuadamente el env\u00edo de notificaciones por correo electr\u00f3nico sobre bugs restringidos, lo que podr\u00eda permitir a usuarios remotos autenticados obtener informaci\u00f3n confidencial mediante la adici\u00f3n de una nota a un error antes de perder el permiso para ver ese error.\r\n" } ], "id": "CVE-2012-5523", "lastModified": "2024-11-21T01:44:49.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-16T00:55:01.790", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=14704" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/56520" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=14704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-03 18:29
Modified
2024-11-21 03:49
Severity ?
Summary
An issue was discovered in manage_filter_edit_page.php in MantisBT 2.x through 2.15.0. A cross-site scripting (XSS) vulnerability in the Edit Filter page allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name (e.g., 'foobar" onclick="alert(1)').
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/602 | Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=24608 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/602 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=24608 | Exploit, Issue Tracking, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2AC9D0D-5278-499A-8790-A7748A96E034", "versionEndIncluding": "2.15.0", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in manage_filter_edit_page.php in MantisBT 2.x through 2.15.0. A cross-site scripting (XSS) vulnerability in the Edit Filter page allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name (e.g., \u0027foobar\" onclick=\"alert(1)\u0027)." }, { "lang": "es", "value": "Se ha descubierto un problema en manage_filter_edit_page.php en MantisBT en versiones 2.x hasta la versi\u00f3n 2.15.0. Una vulnerabilidad Cross-Site Scripting (XSS) en la p\u00e1gina Edit Filter permite la ejecuci\u00f3n de c\u00f3digo arbitrario (si la configuraci\u00f3n CSP lo permite) al mostrar un filtro con un nombre manipulado (p.ej. \u0027foobar\" onclick=\"alert(1)\u0027)." } ], "id": "CVE-2018-14504", "lastModified": "2024-11-21T03:49:12.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-03T18:29:00.487", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24608" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-23 23:55
Modified
2024-11-21 01:31
Severity ?
Summary
MantisBT 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by view_all_inc.php and certain other files.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by view_all_inc.php and certain other files." }, { "lang": "es", "value": "MantisBT v1.2.4 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n directa a un archivo .php, lo que revela la ruta de instalaci\u00f3n en un mensaje de error, como se demostr\u00f3 con view_all_inc.php y algunos otros archivos." } ], "id": "CVE-2011-3755", "lastModified": "2024-11-21T01:31:11.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-09-23T23:55:04.130", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/51199" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:36
Severity ?
Summary
bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privileges for a project to bypass intended access restrictions and move bug reports to a different project.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "79367D94-9665-49D7-94E4-CC9EFC7439BB", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "5875D457-28EF-4076-8E04-60CF9CF6D27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "301F44D1-21E7-4E00-BF45-2190D1FE21FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privileges for a project to bypass intended access restrictions and move bug reports to a different project." }, { "lang": "es", "value": "bug_actiongroup.php de MantisBT anteriores a 1.2.9 no comprueba apropiadamente el permiso report_bug_threshold del proyecto destino cuando se mueve un reporte de bug, lo que permite a usuarios autenticados remotos con los privilegios report_bug_threshold y move_bug_threshold para un proyecto evitar las restricciones de acceso previstas y mover reportes de bug a un proyecto distinto." } ], "id": "CVE-2012-1122", "lastModified": "2024-11-21T01:36:28.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:03.093", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=13748" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=13748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-31 20:15
Modified
2024-11-21 01:50
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "20D2B329-7FE5-4ED4-91C3-5A638D6E8FE1", "versionEndIncluding": "1.2.14", "versionStartIncluding": "1.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "5B755EE8-7DD5-4BD4-97B7-481BD8261F7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en la p\u00e1gina de reporte de la configuraci\u00f3n (archivo adm_config_report.php) en MantisBT versiones 1.2.0rc1 anteriores a 1.2.14, permite a usuarios autenticados remotos inyectar script web o HTML arbitrario por medio de un valor complejo." } ], "id": "CVE-2013-1934", "lastModified": "2024-11-21T01:50:42.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-31T20:15:10.600", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/09/1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15416" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1934" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-30 22:15
Modified
2024-11-21 05:22
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
In MantisBT 2.24.3, SQL Injection can occur in the parameter "access" of the mc_project_get_users function through the API SOAP.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "006A59D2-2B65-494C-9185-F6179F6A9368", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In MantisBT 2.24.3, SQL Injection can occur in the parameter \"access\" of the mc_project_get_users function through the API SOAP." }, { "lang": "es", "value": "En MantisBT versi\u00f3n 2.24.3, una Inyecci\u00f3n SQL puede ocurrir en el par\u00e1metro \"access\" de la funci\u00f3n mc_project_get_users por medio de la API SOAP." } ], "id": "CVE-2020-28413", "lastModified": "2024-11-21T05:22:45.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-30T22:15:12.050", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-03 20:00
Modified
2024-11-21 01:20
Severity ?
Summary
Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.18.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0a1 | |
mantisbt | mantisbt | 0.19.0a2 | |
mantisbt | mantisbt | 0.19.1 | |
mantisbt | mantisbt | 0.19.2 | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 0.19.5 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0a1 | |
mantisbt | mantisbt | 1.0.0a2 | |
mantisbt | mantisbt | 1.0.0a3 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB90875A-388F-493C-8076-F59EA12F9355", "versionEndIncluding": "1.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en admin / upgrade_unattended.php en MantisBT antes de 1.2.4 permite a atacantes remotos incluir y ejecutar archivos locales a trav\u00e9s de un .. (punto punto) en el par\u00e1metro db_type, relacionado con una llamada insegura por MantisBT a una funci\u00f3n en la Biblioteca ADOdb para PHP." } ], "id": "CVE-2010-4350", "lastModified": "2024-11-21T01:20:45.347", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-03T20:00:43.043", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/5" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/2" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42772" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-13 21:32
Modified
2024-11-21 02:19
Severity ?
Summary
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "5875D457-28EF-4076-8E04-60CF9CF6D27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "301F44D1-21E7-4E00-BF45-2190D1FE21FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n mc_project_get_attachments en api/soap/mc_project_api.php en MantisBT anterior a 1.2.18 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro project_id. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta de CVE-2014-1609." } ], "id": "CVE-2014-8554", "lastModified": "2024-11-21T02:19:19.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-13T21:32:11.063", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/479" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/487" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17812" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70856" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-03 20:00
Modified
2024-11-21 01:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.18.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0a1 | |
mantisbt | mantisbt | 0.19.0a2 | |
mantisbt | mantisbt | 0.19.1 | |
mantisbt | mantisbt | 0.19.2 | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 0.19.5 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0a1 | |
mantisbt | mantisbt | 1.0.0a2 | |
mantisbt | mantisbt | 1.0.0a3 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB90875A-388F-493C-8076-F59EA12F9355", "versionEndIncluding": "1.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en admin / upgrade_unattended.php en MantisBT antes de 1.2.4 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro db_type, relacionado con una llamada insegura por MantisBT a una funci\u00f3n en la Biblioteca ADOdb para PHP." } ], "id": "CVE-2010-4348", "lastModified": "2024-11-21T01:20:45.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-01-03T20:00:42.967", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42772" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/blog/?p=123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-21 16:55
Modified
2024-11-21 01:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E421063A-47DD-4307-AB38-331301A1DC6C", "versionEndIncluding": "1.2.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en MantisBT antes de v1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro (1) os, (2) os_build, (3) platform de (a) bug_report_page.php o (b) bug_update_advanced_page.php, relacionado con el uso de la librer\u00eda Projax" } ], "id": "CVE-2011-3358", "lastModified": "2024-11-21T01:30:20.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-09-21T16:55:05.180", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "secalert@redhat.com", "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45961" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8392" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69589" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-09-07 17:00
Modified
2024-11-21 01:17
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.2 allows remote authenticated users to inject arbitrary web script or HTML via an HTML document with a .gif filename extension, related to inline attachments.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.18.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0a1 | |
mantisbt | mantisbt | 0.19.0a2 | |
mantisbt | mantisbt | 0.19.1 | |
mantisbt | mantisbt | 0.19.2 | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 0.19.5 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0a1 | |
mantisbt | mantisbt | 1.0.0a2 | |
mantisbt | mantisbt | 1.0.0a3 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "93D03D4F-01D6-413F-91AC-E7AD75516638", "versionEndIncluding": "1.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.2 allows remote authenticated users to inject arbitrary web script or HTML via an HTML document with a .gif filename extension, related to inline attachments." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en MantisBT antes de v1.2.2 permite a los usuarios remotos autenticados inyectar HTML o scripts web a trav\u00e9s de un documento HTML con una extensi\u00f3n .gif . Se trata de un problema relacionado con los archivos adjuntos en l\u00ednea." } ], "id": "CVE-2010-2802", "lastModified": "2024-11-21T01:17:24.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-09-07T17:00:01.947", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/blog/?p=113" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=11952" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/08/02/16" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/08/03/7" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/blog/?p=113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=11952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/08/02/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/08/03/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620992" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-21 16:55
Modified
2024-11-21 01:30
Severity ?
Summary
Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E421063A-47DD-4307-AB38-331301A1DC6C", "versionEndIncluding": "1.2.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en bug_actiongroup_ext_page.php en MantisBT antes de v1.2.8, permite a atacantes remotos incluir y ejecutar archivos locales de su elecci\u00f3n a trav\u00e9s del par\u00e1metro .. (punto punto) en el par\u00e1metro action, relacionado con bug_actiongroup_page.php." } ], "id": "CVE-2011-3357", "lastModified": "2024-11-21T01:30:19.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-09-21T16:55:05.117", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45961" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8392" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-07 23:15
Modified
2024-11-21 01:50
Severity ?
Summary
An access control issue in MantisBT before 1.2.13 allows users with "Reporter" permissions to change any issue to "New".
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
debian | debian_linux | 6.0 | |
debian | debian_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF26F2EF-E441-4F9C-A408-B5966687705A", "versionEndExcluding": "1.2.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in MantisBT before 1.2.13 allows users with \"Reporter\" permissions to change any issue to \"New\"." }, { "lang": "es", "value": "Un problema de control de acceso en MantisBT versiones anteriores a 1.2.13, permite a usuarios con permisos de \"Reporter\" cambiar cualquier problema a \"New\"." } ], "id": "CVE-2013-1811", "lastModified": "2024-11-21T01:50:26.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-07T23:15:10.393", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/03/6" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/04/9" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15258" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/03/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/04/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1811" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-29 07:15
Modified
2024-11-21 05:24
Severity ?
Summary
An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27357 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27727 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27357 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27727 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1E7F65F-C6A7-4052-8E14-4E285744207F", "versionEndExcluding": "2.24.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)" }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones anteriores a 2.24.4.\u0026#xa0;Debido a unas comprobaciones de nivel de acceso insuficientes, cualquier usuario que haya iniciado sesi\u00f3n con permiso para llevar a cabo acciones de grupo puede conseguir acceso a los campos de Resumen de Problemas privados por medio de bug_arr[]= en una URL bug_actiongroup_page.php dise\u00f1ada.\u0026#xa0;(Los problemas objetivos pueden tener un estado de vista Privada o pertenecer a un proyecto privado)" } ], "id": "CVE-2020-29605", "lastModified": "2024-11-21T05:24:18.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-29T07:15:17.937", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-17 19:15
Modified
2024-11-21 06:09
Severity ?
Summary
An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/699 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=28552 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/699 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=28552 | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3D5FBFB-2BD0-4AA2-BA0E-33F43D61ACA6", "versionEndExcluding": "2.25.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field." }, { "lang": "es", "value": "Se ha detectado un problema de tipo XSS en el archivo manage_custom_field_edit_page.php en MantisBT versiones anteriores a 2.25.2. La salida sin escape del par\u00e1metro return permite a un atacante inyectar c\u00f3digo en un campo hidden input" } ], "id": "CVE-2021-33557", "lastModified": "2024-11-21T06:09:05.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-17T19:15:07.967", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/699" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=28552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=28552" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-12 11:59
Modified
2024-11-21 02:14
Severity ?
Summary
core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php." }, { "lang": "es", "value": "core/string_api.php en MantisBT anterior a 1.2.18 no categoriza correctamente las URLs cuando funciona bajo el root web, lo que permite a atacantes remotos realizar ataques de redirecci\u00f3n abierta y phishing a trav\u00e9s de una URL manipulada en el par\u00e1metro return en login_page.php." } ], "id": "CVE-2014-6316", "lastModified": "2024-11-21T02:14:09.730", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-12-12T11:59:03.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/931" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/12/03/11" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/71478" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/12/03/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/71478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17648" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-17 19:59
Modified
2024-11-21 02:19
Severity ?
Summary
The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request." }, { "lang": "es", "value": "La funci\u00f3n mci_account_get_array_by_id en api/soap/mc_account_api.php en MantisBT anteriores a 1.2.18, permite a atacantes remotos, obtener informaci\u00f3n sensible mediante peticiones SOAP (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues o (4) mc_project_get_issues." } ], "id": "CVE-2014-8553", "lastModified": "2024-11-21T02:19:19.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-17T19:59:06.417", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99257" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17243" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-13 14:15
Modified
2024-11-21 06:53
Severity ?
Summary
An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=29688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=29688 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C85731-06A6-4482-8961-87C1DF556A69", "versionEndExcluding": "2.25.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed." }, { "lang": "es", "value": "Se ha detectado un problema de tipo XSS en MantisBT versiones anteriores a 2.25.3. Un escape inapropiado del nombre de un plugin permite una ejecuci\u00f3n de c\u00f3digo arbitrario (si CSP lo permite) en los archivos manage_plugin_page.php y manage_plugin_uninstall.php cuando es instalado un plugin dise\u00f1ado" } ], "id": "CVE-2022-26144", "lastModified": "2024-11-21T06:53:31.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-13T14:15:09.273", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=29688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=29688" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-17 19:59
Modified
2024-11-21 02:20
Severity ?
Summary
bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter." }, { "lang": "es", "value": "bug_report.php en MantisBT anterior a 1.2.18 permite a atacantes remotos a asignar c\u00f3digo arbitrario mediante el par\u00e1metro handler_id." } ], "id": "CVE-2014-9388", "lastModified": "2024-11-21T02:20:45.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-17T19:59:08.587", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-08 16:59
Modified
2024-11-21 02:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the \"profile/Platform\" field." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la funci\u00f3n projax_array_serialize_for_autocomplete en core/projax_api.php en MantisBT 1.1.0a3 hasta 1.2.17 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del campo \u0027profile/Platform\u0027." } ], "id": "CVE-2014-9270", "lastModified": "2024-11-21T02:20:31.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-12-08T16:59:10.747", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71372" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99037" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/0bff06ec" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/0bff06ec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17583" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-09 18:29
Modified
2024-11-21 02:21
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the url parameter to permalink_page.php.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F99FC-A5C4-4858-9013-C88827660E20", "versionEndIncluding": "1.2.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D355450F-4354-4E0B-BA86-A6BCF0672E1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the url parameter to permalink_page.php." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en MantisBT en versiones anteriores a la 1.2.19 y en versiones 1.3.x anteriores a la 1.3.0-beta.2 permite que atacantes remotos inyecten scripts web o HTML mediante el par\u00e1metro url a permalink_page.php." } ], "id": "CVE-2014-9701", "lastModified": "2024-11-21T02:21:28.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-09T18:29:00.510", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/15/2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202885" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17362#c40613" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=19493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/15/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17362#c40613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=19493" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-01 15:29
Modified
2024-11-21 03:08
Severity ?
Summary
An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "1287A4F6-7331-4B5E-8105-8F66307BC08C", "versionEndExcluding": "1.3.12", "versionStartIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "17391E26-3429-45B8-A8BC-7C95F82F9620", "versionEndExcluding": "2.5.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP." }, { "lang": "es", "value": "Se detect\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) en admin/install.php en MantisBT en versiones anteriores a la 1.3.12 y todas las 2.X anteriores a la 2.5.2. Algunas variables que est\u00e1n bajo el control de usuarios en el script de instalaci\u00f3n de MantisBT no est\u00e1n sanitizadas correctamente antes de que se env\u00eden, permitiendo a los atacantes remotos inyectar c\u00f3digo JavaScript arbitrario, tal y como lo demuestran las variables $f_database, $f_db_username, y $f_admin_username. Esto se mitiga con el hecho de que se deber\u00eda borrar la carpeta admin/ despu\u00e9s de la instalaci\u00f3n y se evita con una pol\u00edtica de seguridad de contenido (CSP)." } ], "id": "CVE-2017-12061", "lastModified": "2024-11-21T03:08:45.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-01T15:29:00.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039030" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23146" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-05 22:00
Modified
2024-11-21 01:18
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.3 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) a plugin name, related to manage_plugin_uninstall.php; (2) an enumeration value or (3) a String value of a custom field, related to core/cfdefs/cfdef_standard.php; or a (4) project or (5) category name to print_all_bug_page_word.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.18.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0 | |
mantisbt | mantisbt | 0.19.0a1 | |
mantisbt | mantisbt | 0.19.0a2 | |
mantisbt | mantisbt | 0.19.1 | |
mantisbt | mantisbt | 0.19.2 | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 0.19.5 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.0a1 | |
mantisbt | mantisbt | 1.0.0a2 | |
mantisbt | mantisbt | 1.0.0a3 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3C4D08-9733-4043-B006-560587335027", "versionEndIncluding": "1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "64BCCC4D-D109-4116-A9C3-E5553686A986", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF1C66-9DC7-4FD3-8651-C5561B2681A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "AC837ACF-EB55-4E9C-BFC5-83BB04B84BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "F8826523-FDEE-4C14-8EAC-97C564272CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "1780295B-215F-4EEE-8CF8-2E3531D7A196", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.3 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) a plugin name, related to manage_plugin_uninstall.php; (2) an enumeration value or (3) a String value of a custom field, related to core/cfdefs/cfdef_standard.php; or a (4) project or (5) category name to print_all_bug_page_word.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en MantisBT antes de v1.2.3 permiten a un administrador remoto autenticado inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) un nombre de plugin, relacionado con manage_plugin_uninstall.php, (2) un valor de enumeraci\u00f3n o (3) un valor de cadena de un campo personalizado, relacionado con el core/cfdefs/cfdef_standard.php, o (4) un nombre de proyecto o (5) un nombre de categor\u00eda en print_all_bug_page_word.php." } ], "id": "CVE-2010-3303", "lastModified": "2024-11-21T01:18:28.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-05T22:00:05.863", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41653" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12231" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12232" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12234" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12238" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/19" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/09/16/16" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/43604" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12234" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/16/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2535" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-08 16:59
Modified
2024-11-21 02:20
Severity ?
Summary
The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5761D76C-7109-4E94-AEC3-3A6419429A91", "versionEndIncluding": "1.2.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter." }, { "lang": "es", "value": "La funci\u00f3n current_user_get_bug_filter en core/current_user_api.php en MantisBT anterior a 1.2.18 permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s del par\u00e1metro filter." } ], "id": "CVE-2014-9280", "lastModified": "2024-11-21T02:20:32.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-08T16:59:13.807", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/864" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/923" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17875" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71361" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99016" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/mantisbt/mantisbt/commit/599364b2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/mantisbt/mantisbt/commit/599364b2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-10 00:59
Modified
2024-11-21 03:30
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in bug_change_status_page.php in MantisBT before 1.3.7 and 2.x before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the 'action_type' parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "95C3C8D0-0C1F-45E3-88E0-2EB50F46E3F4", "versionEndExcluding": "1.3.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "A657445A-49B4-46FB-ABF4-5672D4AE6CAD", "versionEndExcluding": "2.2.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in bug_change_status_page.php in MantisBT before 1.3.7 and 2.x before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the \u0027action_type\u0027 parameter." }, { "lang": "es", "value": "Una vulnerabilidad de XSS en bug_change_status_page.php en MantisBT en versiones anteriores a 1.3.7 y 2.x en versiones anteriores a 2.2.1 permite a atacantes remotos inyectar JavaScript arbitrario a trav\u00e9s del par\u00e1metro \u0027action_type\u0027." } ], "id": "CVE-2017-6797", "lastModified": "2024-11-21T03:30:32.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-10T00:59:00.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22486" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96818" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037978" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-03 18:29
Modified
2024-11-21 03:46
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) in MantisBT 2.1.0 through 2.15.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/blog/archives/mantisbt/602 | Vendor Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=24580 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/blog/archives/mantisbt/602 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=24580 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4A36D7-BF63-42C8-B422-628BE3B16B89", "versionEndIncluding": "2.15.0", "versionStartIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) in MantisBT 2.1.0 through 2.15.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la p\u00e1gina View Filters (view_filters_page.php) en MantisBT, desde la versi\u00f3n 2.1.0 hasta la 2.15.0, permite que los atacantes remotos inyecten c\u00f3digo arbitrario (si la configuraci\u00f3n CSP lo permite) mediante un PATH_INFO manipulado." } ], "id": "CVE-2018-13055", "lastModified": "2024-11-21T03:46:19.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-03T18:29:00.453", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=24580" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:36
Severity ?
Summary
The SOAP API in MantisBT before 1.2.9 does not properly enforce the bugnote_allow_user_edit_delete and delete_bug_threshold permissions, which allows remote authenticated users with read and write SOAP API privileges to delete arbitrary bug reports and bug notes.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "79367D94-9665-49D7-94E4-CC9EFC7439BB", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SOAP API in MantisBT before 1.2.9 does not properly enforce the bugnote_allow_user_edit_delete and delete_bug_threshold permissions, which allows remote authenticated users with read and write SOAP API privileges to delete arbitrary bug reports and bug notes." }, { "lang": "es", "value": "La API SOAP de MantisBT anteriores a 1.2.9 no establece adecuadamente los permisos bugnote_allow_user_edit_delete y delete_bug_threshold permissions, lo que permite a usuarios autenticados remotos con privilegios SOAP API de lectura y escritura borrar reportes y notas de bug." } ], "id": "CVE-2012-1120", "lastModified": "2024-11-21T01:36:28.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:02.953", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=13656" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/df7782a65e96aa1c9639a7625a658102134c7fe0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=13656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/df7782a65e96aa1c9639a7625a658102134c7fe0" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-17 03:41
Modified
2024-11-21 01:39
Severity ?
Summary
MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE1D8387-0DCB-476C-8789-561074548E01", "versionEndIncluding": "1.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments." }, { "lang": "es", "value": "MantisBT anterior a v1.2.11 no comprueba el permiso delete_attachments_threshold form_security_validation cuando est\u00e1 en OFF, lo que permite a usuarios remotos autenticados con ciertos privilegios eludir las restricciones de acceso previstas y eliminar archivos adjuntos arbitrarios." } ], "id": "CVE-2012-2692", "lastModified": "2024-11-21T01:39:27.473", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-17T03:41:41.907", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=14016" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53921" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/ceafe6f0c679411b81368052633a63dd3ca06d9c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=14016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/ceafe6f0c679411b81368052633a63dd3ca06d9c" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-10 20:59
Modified
2024-11-21 02:24
Severity ?
Summary
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 | |
mantisbt | mantisbt | 1.2.7 | |
mantisbt | mantisbt | 1.2.8 | |
mantisbt | mantisbt | 1.2.9 | |
mantisbt | mantisbt | 1.2.10 | |
mantisbt | mantisbt | 1.2.11 | |
mantisbt | mantisbt | 1.2.12 | |
mantisbt | mantisbt | 1.2.13 | |
mantisbt | mantisbt | 1.2.14 | |
mantisbt | mantisbt | 1.2.15 | |
mantisbt | mantisbt | 1.2.16 | |
mantisbt | mantisbt | 1.2.17 | |
mantisbt | mantisbt | 1.2.18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "F5F8FB8B-C009-4BF5-B3C3-142FFD0BD5F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a \":/\" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316." }, { "lang": "es", "value": "La funci\u00f3n string_sanitize_url en core/string_api.php en MantisBT 1.2.0a3 hasta 1.2.18 utiliza una expresi\u00f3n regular incorrecta, lo que permite a atacantes remotos realizar ataques de redirecci\u00f3n abierta y phishing a trav\u00e9s de una URL con un separador \u0027:/\u0027 (dos puntos barra oblicua) en el par\u00e1metro return en login_page.php, una vulnerabilidad diferente a CVE-2014-6316." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/601.html\"\u003eCWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\u003c/a\u003e", "id": "CVE-2015-1042", "lastModified": "2024-11-21T02:24:31.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-02-10T20:59:00.060", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/110" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "cve@mitre.org", "url": "https://www.mantisbt.org/bugs/view.php?id=17997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mantisbt.org/bugs/view.php?id=17997" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2024-11-21 02:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the selection list in the filters in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via a crafted config option, a different vulnerability than CVE-2014-8987.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the selection list in the filters in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via a crafted config option, a different vulnerability than CVE-2014-8987." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la lista de selecci\u00f3n en los filtros en la p\u00e1gina Configuration Report (adm_config_report.php) en MantisBT 1.2.13 hasta 1.2.17 permite a administradores remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un opci\u00f3n de configuraci\u00f3n manipulada, una vulnerabilidad diferente a CVE-2014-8987." } ], "id": "CVE-2014-8986", "lastModified": "2024-11-21T02:20:02.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-11-24T15:59:13.327", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/19/20" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/19/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-21 16:55
Modified
2024-11-21 01:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 | |
mantisbt | mantisbt | 1.2.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E421063A-47DD-4307-AB38-331301A1DC6C", "versionEndIncluding": "1.2.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en confige_defaults_inc.php en MantisBT antes de v1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de PATH_INFO, como se demostr\u00f3 con el PATH_INFO de (1) manage_config_email_page.php, (2) manage_confige_workflow_page.php, o (3) bugs/plugin.php" } ], "id": "CVE-2011-3356", "lastModified": "2024-11-21T01:30:19.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-09-21T16:55:04.930", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8392" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13191" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69587" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-09 18:59
Modified
2024-11-21 02:20
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in helper_api.php in MantisBT 1.1.0a1 through 1.2.x before 1.2.18, when Extended project browser is enabled, allows remote attackers to inject arbitrary web script or HTML via the project cookie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "5875D457-28EF-4076-8E04-60CF9CF6D27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "301F44D1-21E7-4E00-BF45-2190D1FE21FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in helper_api.php in MantisBT 1.1.0a1 through 1.2.x before 1.2.18, when Extended project browser is enabled, allows remote attackers to inject arbitrary web script or HTML via the project cookie." }, { "lang": "es", "value": "Vulnerabilidad de XSS en helper_api.php en MantisBT 1.1.0a1 hasta 1.2.x anterior a 1.2.18, cuando el navegador de proyectos extendidos est\u00e1 habilitado, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de la cookie de proyectos." } ], "id": "CVE-2014-9269", "lastModified": "2024-11-21T02:20:31.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-01-09T18:59:01.117", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62101" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "cve@mitre.org", "url": "https://github.com/mantisbt/mantisbt/commit/511564cc" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/mantisbt/mantisbt/commit/511564cc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17890" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-10 12:23
Modified
2024-11-21 01:16
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en manage_proj_cat_add.php en MantisBT v1.2.2 permite a administradores autenticados remotamente inyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro \"name\" en una acci\u00f3n \"Add Category\"." } ], "evaluatorImpact": "Per: http://secunia.com/secunia_research/2010-103/\r\n\r\n\"Successful exploitation requires \"manager\" permissions.\"", "id": "CVE-2010-2574", "lastModified": "2024-11-21T01:16:55.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-10T12:23:06.067", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40832" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/41653" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-103/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.mantisbt.org/bugs/view.php?id=12230" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/512886/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-103/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=12230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/512886/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2535" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-21 16:55
Modified
2024-11-21 01:29
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
mantisbt | mantisbt | 0.19.3 | |
mantisbt | mantisbt | 0.19.4 | |
mantisbt | mantisbt | 1.0.0 | |
mantisbt | mantisbt | 1.0.1 | |
mantisbt | mantisbt | 1.0.2 | |
mantisbt | mantisbt | 1.0.3 | |
mantisbt | mantisbt | 1.0.4 | |
mantisbt | mantisbt | 1.0.5 | |
mantisbt | mantisbt | 1.0.6 | |
mantisbt | mantisbt | 1.0.7 | |
mantisbt | mantisbt | 1.0.8 | |
mantisbt | mantisbt | 1.1.0 | |
mantisbt | mantisbt | 1.1.1 | |
mantisbt | mantisbt | 1.1.2 | |
mantisbt | mantisbt | 1.1.4 | |
mantisbt | mantisbt | 1.1.5 | |
mantisbt | mantisbt | 1.1.6 | |
mantisbt | mantisbt | 1.1.7 | |
mantisbt | mantisbt | 1.1.8 | |
mantisbt | mantisbt | 1.2.0 | |
mantisbt | mantisbt | 1.2.1 | |
mantisbt | mantisbt | 1.2.2 | |
mantisbt | mantisbt | 1.2.3 | |
mantisbt | mantisbt | 1.2.4 | |
mantisbt | mantisbt | 1.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE0A36B6-B2BE-45C0-91CE-3E264CECAF9D", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php." }, { "lang": "es", "value": "Varias vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en filter_api.php en MantisBT antes de la versi\u00f3n v1.2.7 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de un par\u00e1metro, tal y como se demuestra por el par\u00e1metro project_id a search.php." } ], "id": "CVE-2011-2938", "lastModified": "2024-11-21T01:29:19.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-09-21T16:55:04.100", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/104149" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8391" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13245" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/18/7" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/16" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/49235" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=379739" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731777" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/104149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/18/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/49235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=379739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-16 00:55
Modified
2024-11-21 01:44
Severity ?
Summary
MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF1B52BB-9CDA-4676-A922-1EFBA1DF35CD", "versionEndIncluding": "1.2.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting." }, { "lang": "es", "value": "MantisBT antes de v1.2.12 no utiliza un valor por defecto esperado durante las decisiones sobre si un usuario puede modificar el estado de un bug, lo que permite a usuarios remotos autenticados eludir restricciones de acceso y hacer cambios en el estado al aprovecharse de un valor en blanco para un configuraci\u00f3n \"por-estado\".\r\n" } ], "id": "CVE-2012-5522", "lastModified": "2024-11-21T01:44:49.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-16T00:55:01.680", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/view.php?id=14496" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/56520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/view.php?id=14496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56520" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-17 17:59
Modified
2024-11-21 02:57
Severity ?
Summary
MantisBT before 1.3.1 and 2.x before 2.0.0-beta.2 uses a weak Content Security Policy when using the Gravatar plugin, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/28/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/08/29/2 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/mantisbt/mantisbt/commit/b3511d2f | Patch | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=21263 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/28/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/08/29/2 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mantisbt/mantisbt/commit/b3511d2f | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=21263 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "01D7EBC4-9D0E-4502-96E6-C26B97F16059", "versionEndIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "541BD5B7-9F88-4B6A-A9D5-3BB182661EC8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.3.1 and 2.x before 2.0.0-beta.2 uses a weak Content Security Policy when using the Gravatar plugin, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors." }, { "lang": "es", "value": "MantisBT en versiones anteriores a 1.3.1 y 2.x en versiones anteriores a 2.0.0-beta.2 utiliza una pol\u00edtica de seguridad de contenido d\u00e9bil cuando se utiliza el plugin Gravatar, que permite a atacantes remotos realizar ataques de secuencias de comandos de sitios cruzados (XSS) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-7111", "lastModified": "2024-11-21T02:57:29.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-17T17:59:01.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/28/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/29/2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/b3511d2f" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=21263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/28/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/29/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/b3511d2f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=21263" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:36
Severity ?
Summary
The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "79367D94-9665-49D7-94E4-CC9EFC7439BB", "versionEndIncluding": "1.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF83F757-4B62-441C-8421-15809E573A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "A608AFEC-B265-4143-99DA-BB2AE9D522BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "matchCriteriaId": "A826DA75-7DEE-4E96-9B00-347508BBCFE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "matchCriteriaId": "06663B16-0609-4FCF-9B42-6BF30D25E67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7FCB56AC-4C14-49B1-BEFE-8651BC70476E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F59BAE6B-C73D-4BE2-AEF9-93F2F4A4373F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA5C2F-FB7C-4D95-81DE-24D8EADC5C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EE8BCBE-D864-4311-B73A-DF92162D8DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "matchCriteriaId": "482256A6-B213-4226-AF03-9F93164AA337", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "matchCriteriaId": "1F005474-CEBD-48FC-9C7F-861AFF771081", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "matchCriteriaId": "BEF461E5-24D2-4540-A2FC-E0D4C3488B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62F6B391-DDE3-4E8E-8582-85EA7287E591", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "80DBD667-1FB9-4354-9150-A190D4D817A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F27E40C0-263F-452B-8C91-E621A02EFC28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "CB888B14-EA67-4EDB-A3AF-ACD3F0A6227E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "1DB45A02-2522-4E10-BC81-48750ACB42DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A94C0-48A1-4D42-AC43-7B4E959C4E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "45FF2B45-AA64-4428-8F6E-65C5171990CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "CC868663-1E48-4F9A-B687-5B48D016611B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "4F04ED02-4D99-45CF-9BEC-AC0F648748EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "matchCriteriaId": "0AC08731-C4BB-4D84-ADBE-80054149BF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "35AAF0B4-31B5-4849-813F-63D9546C2E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB98EF06-7D6E-4D5F-819D-21B437E91B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66AB409E-5A5B-4455-8B68-22C32152681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6A13A38-E149-42A7-9309-BC991521320B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "078C0943-C27C-44A9-B00D-5A261C58D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password." }, { "lang": "es", "value": "La funci\u00f3n mci_check_login de api/soap/mc_api.php de la API SOAP de MantisBT anteriores a 1.2.9 permite a atacantes remotos evitar la autenticaci\u00f3n a trav\u00e9s de una contrase\u00f1a nula." } ], "id": "CVE-2012-1123", "lastModified": "2024-11-21T01:36:28.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:03.140", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51199" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "secalert@redhat.com", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13901" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/f5106be52cf6aa72c521f388e4abb5f0de1f1d7f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/f5106be52cf6aa72c521f388e4abb5f0de1f1d7f" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-31 20:15
Modified
2024-11-21 01:50
Severity ?
Summary
MantisBT 1.2.12 before 1.2.15 allows authenticated users to by the workflow restriction and close issues.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | * | |
fedoraproject | fedora | 17 | |
fedoraproject | fedora | 18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A743492-424E-41E5-AFFF-5E9E6D2C1016", "versionEndExcluding": "1.2.15", "versionStartIncluding": "1.2.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT 1.2.12 before 1.2.15 allows authenticated users to by the workflow restriction and close issues." }, { "lang": "es", "value": "MantisBT versiones 1.2.12 anteriores a 1.2.15, permite a usuarios autenticados la restricci\u00f3n del flujo de trabajo y cerrar problemas." } ], "id": "CVE-2013-1930", "lastModified": "2024-11-21T01:50:41.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-31T20:15:10.350", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58890" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1930" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83796" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15453" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=15453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1930" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-16 14:59
Modified
2024-11-21 03:32
Severity ?
Summary
MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "37C4C701-6BDB-4711-9DB9-9A6194455DC9", "versionEndIncluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php." }, { "lang": "es", "value": "MantisBT hasta la versi\u00f3n 2.3.0 permite reinicio de contrase\u00f1a arbitrario y acceso de administrador no autenticado a trav\u00e9s de un valor confirm_hash vac\u00edo para verify.php" } ], "id": "CVE-2017-7615", "lastModified": "2024-11-21T03:32:17.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-16T14:59:00.147", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/2" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97707" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=22690" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41890/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=22690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41890/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-18 17:59
Modified
2024-11-21 03:32
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER['PHP_SELF'] to generate URLs.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "83C79C70-F6BE-485D-952A-44E5E9F16D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B5AE145-E1B4-40EF-A3B8-A13C114D3D3B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER[\u0027PHP_SELF\u0027] to generate URLs." }, { "lang": "es", "value": "Una vulnerabilidad XSS en el MantisBT (2.3.x en versiones anteriores a 2.3.2) Timeline incluye p\u00e1gina, utilizada en My View (my_view_page.php) y p\u00e1ginas User Information (view_user_page.php), permite a atacantes remotos inyectar c\u00f3digo arbitrario (si los ajustes CSP lo permiten) a trav\u00e9s de PATH_INFO manipulado en una URL, debido al uso de $_SERVER[\u0027PHP_SELF\u0027] no desinfectado para generar URLs." } ], "id": "CVE-2017-7897", "lastModified": "2024-11-21T03:32:55.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-18T17:59:00.163", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22742" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038278" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/pull/1094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038278" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://github.com/mantisbt/mantisbt/pull/1094" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-31 04:59
Modified
2024-11-21 03:30
Severity ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.mantisbt.org/bugs/view.php?id=22537 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/97252 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1038169 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mantisbt.org/bugs/view.php?id=22537 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97252 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038169 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mantisbt | mantisbt | 1.3.0 | |
mantisbt | mantisbt | 1.3.1 | |
mantisbt | mantisbt | 1.3.2 | |
mantisbt | mantisbt | 1.3.3 | |
mantisbt | mantisbt | 1.3.4 | |
mantisbt | mantisbt | 1.3.5 | |
mantisbt | mantisbt | 1.3.6 | |
mantisbt | mantisbt | 1.3.7 | |
mantisbt | mantisbt | 1.3.8 | |
mantisbt | mantisbt | 1.3.9 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.0 | |
mantisbt | mantisbt | 2.0.1 | |
mantisbt | mantisbt | 2.1.0 | |
mantisbt | mantisbt | 2.1.1 | |
mantisbt | mantisbt | 2.1.2 | |
mantisbt | mantisbt | 2.1.3 | |
mantisbt | mantisbt | 2.2.0 | |
mantisbt | mantisbt | 2.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EC65E660-1F4A-4040-8C4D-197BD9081E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF8D4B34-E00E-4137-8695-6C9C74980DC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "62C8D0CC-FB77-43B5-8A50-7F5C462E9771", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "29B09C56-E71E-4272-A47E-9CC530EEEA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "7323557C-F23F-4A83-ADAD-889E3C8B0C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "11779871-2959-404C-A8A1-C35DACC3EC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6BB766F-D8E9-4D1A-A877-2BF75C1E0D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CDEDA19B-58F9-4416-AF6A-8F1639D665CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "26A1E879-1D21-418E-A72E-287C7E977714", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "C1519517-765C-4426-8C09-51EBD699EE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B537D8BB-944B-4B92-B48D-0CA5A2D01372", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "541BD5B7-9F88-4B6A-A9D5-3BB182661EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DBD43A80-1179-426B-AF21-AE8B29CA1E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "F39D6AB1-ECA5-4CE6-BBB3-570758AA715A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5202AE86-61A0-4146-BB18-5CD4F38A880C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0A2965D7-794C-4451-9DB7-B5561B5E3254", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "39492D12-1A13-43CE-84A7-F5CCFB87D612", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E6AF670-28C3-4D7E-9EB4-E0B366CE818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "021CC8F4-B310-4DBF-9D50-B8A357158E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D73E7205-12E1-4C57-A120-91C4C0760305", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "262EC0CC-0716-4AED-9255-13288A297879", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2550F1FD-5104-4BAA-80F6-C6202D7326B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDE5FC-B891-4ACA-BCAB-83EB9D49C91F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted \u0027action\u0027 parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2." }, { "lang": "es", "value": "Una vulnerabilidad XSS en la p\u00e1gina Informe de configuraci\u00f3n de MantisBT (adm_config_report.php) permite a atacantes remotos inyectar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro \u0027acci\u00f3n\u0027 creado. Esto se fija en 1.3.8, 2.1.2 y 2.2.2." } ], "id": "CVE-2017-6973", "lastModified": "2024-11-21T03:30:53.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-31T04:59:00.220", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22537" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97252" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038169" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-30 21:15
Modified
2024-11-21 05:17
Severity ?
Summary
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c | Patch, Third Party Advisory | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=27275 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=27275 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAC99001-43F4-461D-9C3A-AB33CA4B9F94", "versionEndExcluding": "2.24.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input\u0027s pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript." }, { "lang": "es", "value": "Se detect\u00f3 un problema en MantisBT versiones anteriores a 2.24.3.\u0026#xa0;Cuando se edita un problema en un proyecto donde se usa un campo personalizado con una propiedad de expresi\u00f3n regular dise\u00f1ada, el escape incorrecto del atributo de patr\u00f3n de entrada del formulario correspondiente permite la inyecci\u00f3n de HTML y, si la configuraci\u00f3n de CSP lo permite, una ejecuci\u00f3n de JavaScript arbitrario" } ], "id": "CVE-2020-25288", "lastModified": "2024-11-21T05:17:52.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-30T21:15:13.167", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=27275" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2013-1934
Vulnerability from cvelistv5
Published
2019-10-31 19:05
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2015/dsa-3120 | x_refsource_MISC | |
https://security-tracker.debian.org/tracker/CVE-2013-1934 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/04/09/1 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=15416 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1934" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/09/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=15416" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisBT", "vendor": "mantisBT", "versions": [ { "status": "affected", "version": "1.2.0rc1 before 1.2.14" } ] } ], "datePublic": "2013-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T19:05:16", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1934" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/09/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=15416" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1934", "datePublished": "2019-10-31T19:05:16", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5522
Vulnerability from cvelistv5
Published
2012-11-16 00:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html | vendor-advisory, x_refsource_FEDORA | |
http://www.mantisbt.org/bugs/view.php?id=14496 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/56520 | vdb-entry, x_refsource_BID | |
http://openwall.com/lists/oss-security/2012/11/14/1 | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html | vendor-advisory, x_refsource_FEDORA | |
http://www.mantisbt.org/bugs/changelog_page.php?version_id=150 | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:47.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14496" }, { "name": "56520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56520" }, { "name": "[oss-security] 20121114 Re: CVE request: mantis before 1.2.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-11-20T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14496" }, { "name": "56520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56520" }, { "name": "[oss-security] 20121114 Re: CVE request: mantis before 1.2.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-5522", "datePublished": "2012-11-16T00:00:00", "dateReserved": "2012-10-24T00:00:00", "dateUpdated": "2024-08-06T21:05:47.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9624
Vulnerability from cvelistv5
Published
2017-09-12 14:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
CAPTCHA bypass vulnerability in MantisBT before 1.2.19.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1031633 | vdb-entry, x_refsource_SECTRACK | |
https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt&version=1.2.19 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17984 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100213 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2015/01/18/11 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1183593 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt\u0026version=1.2.19" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17984" }, { "name": "mantisbt-cve20149624-sec-bypass(100213)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100213" }, { "name": "[oss-security] 20150118 Re: CVE request: CAPTCHA bypass in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/18/11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183593" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "CAPTCHA bypass vulnerability in MantisBT before 1.2.19." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-12T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt\u0026version=1.2.19" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17984" }, { "name": "mantisbt-cve20149624-sec-bypass(100213)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100213" }, { "name": "[oss-security] 20150118 Re: CVE request: CAPTCHA bypass in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/18/11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183593" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9624", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CAPTCHA bypass vulnerability in MantisBT before 1.2.19." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031633" }, { "name": "https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt\u0026version=1.2.19", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt\u0026version=1.2.19" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17984", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17984" }, { "name": "mantisbt-cve20149624-sec-bypass(100213)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100213" }, { "name": "[oss-security] 20150118 Re: CVE request: CAPTCHA bypass in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/18/11" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1183593", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183593" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9624", "datePublished": "2017-09-12T14:00:00", "dateReserved": "2015-01-18T00:00:00", "dateUpdated": "2024-08-06T13:47:41.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33910
Vulnerability from cvelistv5
Published
2022-06-24 16:45
Modified
2024-08-03 08:09
Severity ?
EPSS score ?
Summary
An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=29135 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=30384 | x_refsource_MISC | |
https://mantisbt.org/blog/archives/mantisbt/719 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:22.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=29135" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=30384" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/719" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T16:45:56", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=29135" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=30384" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/719" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-33910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=29135", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=29135" }, { "name": "https://mantisbt.org/bugs/view.php?id=30384", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=30384" }, { "name": "https://mantisbt.org/blog/archives/mantisbt/719", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/719" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-33910", "datePublished": "2022-06-24T16:45:56", "dateReserved": "2022-06-17T00:00:00", "dateUpdated": "2024-08-03T08:09:22.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29604
Vulnerability from cvelistv5
Published
2021-01-29 06:45
Modified
2024-08-04 16:55
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27357 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=27728 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27728" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-29T06:45:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27728" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29604", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27357", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "name": "https://mantisbt.org/bugs/view.php?id=27728", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27728" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29604", "datePublished": "2021-01-29T06:45:19", "dateReserved": "2020-12-07T00:00:00", "dateUpdated": "2024-08-04T16:55:10.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25830
Vulnerability from cvelistv5
Published
2020-09-30 20:33
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27304 | x_refsource_MISC | |
http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27304" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field\u0027s name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-30T20:33:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27304" }, { "tags": [ "x_refsource_MISC" ], "url": "http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field\u0027s name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27304", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27304" }, { "name": "http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d", "refsource": "MISC", "url": "http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25830", "datePublished": "2020-09-30T20:33:43", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6526
Vulnerability from cvelistv5
Published
2018-02-02 09:00
Modified
2024-08-05 06:10
Severity ?
EPSS score ?
Summary
view_all_bug_page.php in MantisBT 2.10.0-development before 2018-02-02 allows remote attackers to discover the full path via an invalid filter parameter, related to a filter_ensure_valid_filter call in current_user_api.php.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=23921 | x_refsource_MISC | |
http://www.securityfocus.com/bid/103065 | vdb-entry, x_refsource_BID | |
https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=23921" }, { "name": "103065", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103065" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "view_all_bug_page.php in MantisBT 2.10.0-development before 2018-02-02 allows remote attackers to discover the full path via an invalid filter parameter, related to a filter_ensure_valid_filter call in current_user_api.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-07T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=23921" }, { "name": "103065", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103065" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "view_all_bug_page.php in MantisBT 2.10.0-development before 2018-02-02 allows remote attackers to discover the full path via an invalid filter parameter, related to a filter_ensure_valid_filter call in current_user_api.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=23921", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=23921" }, { "name": "103065", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103065" }, { "name": "https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/de686a9e6d8c909485b87ca09c8f912bf83082f2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6526", "datePublished": "2018-02-02T09:00:00", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-08-05T06:10:10.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9269
Vulnerability from cvelistv5
Published
2015-01-09 18:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in helper_api.php in MantisBT 1.1.0a1 through 1.2.x before 1.2.18, when Extended project browser is enabled, allows remote attackers to inject arbitrary web script or HTML via the project cookie.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=17890 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/511564cc | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/867 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q4/902 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17890" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/511564cc" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in helper_api.php in MantisBT 1.1.0a1 through 1.2.x before 1.2.18, when Extended project browser is enabled, allows remote attackers to inject arbitrary web script or HTML via the project cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17890" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/511564cc" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in helper_api.php in MantisBT 1.1.0a1 through 1.2.x before 1.2.18, when Extended project browser is enabled, allows remote attackers to inject arbitrary web script or HTML via the project cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=17890", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17890" }, { "name": "https://github.com/mantisbt/mantisbt/commit/511564cc", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/511564cc" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9269", "datePublished": "2015-01-09T18:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3356
Vulnerability from cvelistv5
Published
2011-09-21 16:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8392" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49448" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13191" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "mantisbt-unspecified-xss(69587)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69587" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8392" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49448" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13191" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "mantisbt-unspecified-xss(69587)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69587" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3356", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8392", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8392" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html", "refsource": "MISC", "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=735514", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49448" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=13281", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=13191", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=13191" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "mantisbt-unspecified-xss(69587)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69587" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "refsource": "MLIST", "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3356", "datePublished": "2011-09-21T16:00:00", "dateReserved": "2011-08-30T00:00:00", "dateUpdated": "2024-08-06T23:29:56.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7222
Vulnerability from cvelistv5
Published
2017-03-22 05:31
Modified
2024-08-05 15:56
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in MantisBT before 2.1.1 allows remote attackers to inject arbitrary HTML or JavaScript (if MantisBT's CSP settings permit it) by modifying 'window_title' in the application configuration. This requires privileged access to MantisBT configuration management pages (i.e., administrator access rights) or altering the system configuration file (config_inc.php).
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=22266 | x_refsource_CONFIRM | |
http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:35.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=22266" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in MantisBT before 2.1.1 allows remote attackers to inject arbitrary HTML or JavaScript (if MantisBT\u0027s CSP settings permit it) by modifying \u0027window_title\u0027 in the application configuration. This requires privileged access to MantisBT configuration management pages (i.e., administrator access rights) or altering the system configuration file (config_inc.php)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-22T05:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=22266" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in MantisBT before 2.1.1 allows remote attackers to inject arbitrary HTML or JavaScript (if MantisBT\u0027s CSP settings permit it) by modifying \u0027window_title\u0027 in the application configuration. This requires privileged access to MantisBT configuration management pages (i.e., administrator access rights) or altering the system configuration file (config_inc.php)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=22266", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=22266" }, { "name": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a", "refsource": "CONFIRM", "url": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7222", "datePublished": "2017-03-22T05:31:00", "dateReserved": "2017-03-22T00:00:00", "dateUpdated": "2024-08-05T15:56:35.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8553
Vulnerability from cvelistv5
Published
2014-12-17 19:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/99257 | vdb-entry, x_refsource_XF | |
https://bugzilla.redhat.com/show_bug.cgi?id=1171783 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/955 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
https://www.mantisbt.org/bugs/changelog_page.php?version_id=191 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17243 | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mantisbt-cve20148553-info-disc(99257)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99257" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783" }, { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17243" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mantisbt-cve20148553-info-disc(99257)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99257" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783" }, { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17243" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mantisbt-cve20148553-info-disc(99257)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99257" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783" }, { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "name": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17243", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17243" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8553", "datePublished": "2014-12-17T19:00:00", "dateReserved": "2014-10-30T00:00:00", "dateUpdated": "2024-08-06T13:18:48.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23830
Vulnerability from cvelistv5
Published
2024-02-20 21:44
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=19381 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-23830", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T16:05:28.582374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:50.098Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:08.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744" }, { "name": "https://mantisbt.org/bugs/view.php?id=19381", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=19381" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.26.1" } ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user\u0027s email address and username can hijack the user\u0027s account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-20T21:44:27.707Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744" }, { "name": "https://mantisbt.org/bugs/view.php?id=19381", "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=19381" } ], "source": { "advisory": "GHSA-mcqj-7p29-9528", "discovery": "UNKNOWN" }, "title": "MantisBT Host Header Injection vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23830", "datePublished": "2024-02-20T21:44:27.707Z", "dateReserved": "2024-01-22T22:23:54.339Z", "dateUpdated": "2024-08-01T23:13:08.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1121
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:45
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.9 does not properly check permissions, which allows remote authenticated users with manager privileges to (1) modify or (2) delete global categories.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52313" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/9443258724e84cb388aa1865b775beaecd80596d" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13561" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.9 does not properly check permissions, which allows remote authenticated users with manager privileges to (1) modify or (2) delete global categories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52313" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/9443258724e84cb388aa1865b775beaecd80596d" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13561" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48258" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1121", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1930
Vulnerability from cvelistv5
Published
2019-10-31 19:05
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
MantisBT 1.2.12 before 1.2.15 allows authenticated users to by the workflow restriction and close issues.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1930 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1930 | x_refsource_MISC | |
http://www.securityfocus.com/bid/58890 | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/04/06/4 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83796 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=15453 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1930" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1930" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58890" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83796" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=15453" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisBT", "vendor": "mantisBT", "versions": [ { "status": "affected", "version": "1.2.12 before 1.2.15" } ] } ], "datePublic": "2013-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT 1.2.12 before 1.2.15 allows authenticated users to by the workflow restriction and close issues." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T19:05:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1930" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1930" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/58890" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83796" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=15453" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1930", "datePublished": "2019-10-31T19:05:01", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6387
Vulnerability from cvelistv5
Published
2014-10-22 14:00
Modified
2024-08-06 12:17
Severity ?
EPSS score ?
Summary
gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/09/12/14 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/09/12/11 | mailing-list, x_refsource_MLIST | |
http://www.mantisbt.org/bugs/view.php?id=17640 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/09/13/1 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:17:23.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140912 Re: CVE request: MantisBT Null byte poisoning in LDAP authentication", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/12/14" }, { "name": "[oss-security] 20140912 CVE request: MantisBT Null byte poisoning in LDAP authentication", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/12/11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17640" }, { "name": "[oss-security] 20140913 Re: CVE request: MantisBT Null byte poisoning in LDAP authentication", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-12T00:00:00", "descriptions": [ { "lang": "en", "value": "gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-10-22T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140912 Re: CVE request: MantisBT Null byte poisoning in LDAP authentication", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/12/14" }, { "name": "[oss-security] 20140912 CVE request: MantisBT Null byte poisoning in LDAP authentication", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/12/11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17640" }, { "name": "[oss-security] 20140913 Re: CVE request: MantisBT Null byte poisoning in LDAP authentication", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140912 Re: CVE request: MantisBT Null byte poisoning in LDAP authentication", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/12/14" }, { "name": "[oss-security] 20140912 CVE request: MantisBT Null byte poisoning in LDAP authentication", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/12/11" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17640", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17640" }, { "name": "[oss-security] 20140913 Re: CVE request: MantisBT Null byte poisoning in LDAP authentication", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6387", "datePublished": "2014-10-22T14:00:00", "dateReserved": "2014-09-12T00:00:00", "dateUpdated": "2024-08-06T12:17:23.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6797
Vulnerability from cvelistv5
Published
2017-03-10 00:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in bug_change_status_page.php in MantisBT before 1.3.7 and 2.x before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the 'action_type' parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037978 | vdb-entry, x_refsource_SECTRACK | |
http://www.mantisbt.org/bugs/view.php?id=22486 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96818 | vdb-entry, x_refsource_BID | |
https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2017/03/10/1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f" }, { "name": "1037978", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037978" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22486" }, { "name": "96818", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in bug_change_status_page.php in MantisBT before 1.3.7 and 2.x before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the \u0027action_type\u0027 parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-14T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f" }, { "name": "1037978", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037978" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22486" }, { "name": "96818", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-6797", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in bug_change_status_page.php in MantisBT before 1.3.7 and 2.x before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the \u0027action_type\u0027 parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/a2d90ecabf3bcf3aa22ed9dbbecfd3d37902956f" }, { "name": "1037978", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037978" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=22486", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=22486" }, { "name": "96818", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96818" }, { "name": "https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/c272c3f65da9677e505ff692b1f1e476b3afa56e" }, { "name": "http://www.openwall.com/lists/oss-security/2017/03/10/1", "refsource": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-6797", "datePublished": "2017-03-10T00:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:41:17.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33557
Vulnerability from cvelistv5
Published
2021-06-17 18:14
Modified
2024-08-03 23:50
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=28552 | x_refsource_MISC | |
https://mantisbt.org/blog/archives/mantisbt/699 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=28552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/699" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-17T18:14:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=28552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/699" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=28552", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=28552" }, { "name": "https://mantisbt.org/blog/archives/mantisbt/699", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/699" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33557", "datePublished": "2021-06-17T18:14:52", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-08-03T23:50:43.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1042
Vulnerability from cvelistv5
Published
2015-02-10 20:00
Modified
2024-08-06 04:33
Severity ?
EPSS score ?
Summary
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=17997 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1031633 | vdb-entry, x_refsource_SECTRACK | |
http://www.openwall.com/lists/oss-security/2015/01/10/5 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/01/11/8 | mailing-list, x_refsource_MLIST | |
http://seclists.org/fulldisclosure/2015/Jan/110 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:33:20.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17997" }, { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150110 Re: CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5" }, { "name": "[oss-security] 20150111 Re: Re: CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8" }, { "name": "20150128 CVE-2015-1042 - Mantis BugTracker 1.2.19 - URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/110" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a \":/\" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-05T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17997" }, { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150110 Re: CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5" }, { "name": "[oss-security] 20150111 Re: Re: CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8" }, { "name": "20150128 CVE-2015-1042 - Mantis BugTracker 1.2.19 - URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/110" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a \":/\" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=17997", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17997" }, { "name": "1031633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150110 Re: CVE-2014-6316: URL redirection issue in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5" }, { "name": "[oss-security] 20150111 Re: Re: CVE-2014-6316: URL redirection issue in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8" }, { "name": "20150128 CVE-2015-1042 - Mantis BugTracker 1.2.19 - URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jan/110" }, { "name": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1042", "datePublished": "2015-02-10T20:00:00", "dateReserved": "2015-01-11T00:00:00", "dateUpdated": "2024-08-06T04:33:20.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9701
Vulnerability from cvelistv5
Published
2017-08-09 18:00
Modified
2024-08-06 13:55
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the url parameter to permalink_page.php.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=19493 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/03/15/2 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1202885 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17362#c40613 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:55:04.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=19493" }, { "name": "[oss-security] 20150314 Re: CVE Request: XSS issue in MantisBT permalink_page.php", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/15/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202885" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17362#c40613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the url parameter to permalink_page.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-09T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=19493" }, { "name": "[oss-security] 20150314 Re: CVE Request: XSS issue in MantisBT permalink_page.php", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/03/15/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202885" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17362#c40613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9701", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the url parameter to permalink_page.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=19493", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=19493" }, { "name": "[oss-security] 20150314 Re: CVE Request: XSS issue in MantisBT permalink_page.php", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/03/15/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202885", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202885" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17362#c40613", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17362#c40613" }, { "name": "https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/d95f070db852614fa18ccca6a4f12f4bffede1fd" }, { "name": "https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/e7e2b5503580e42db9d91e0d599d61d3ff03c27e" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9701", "datePublished": "2017-08-09T18:00:00", "dateReserved": "2015-03-14T00:00:00", "dateUpdated": "2024-08-06T13:55:04.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5523
Vulnerability from cvelistv5
Published
2012-11-16 00:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
core/email_api.php in MantisBT before 1.2.12 does not properly manage the sending of e-mail notifications about restricted bugs, which might allow remote authenticated users to obtain sensitive information by adding a note to a bug before losing permission to view that bug.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/56520 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80070 | vdb-entry, x_refsource_XF | |
http://openwall.com/lists/oss-security/2012/11/14/1 | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html | vendor-advisory, x_refsource_FEDORA | |
http://www.mantisbt.org/bugs/changelog_page.php?version_id=150 | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html | vendor-advisory, x_refsource_FEDORA | |
http://www.mantisbt.org/bugs/view.php?id=14704 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:47.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "56520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56520" }, { "name": "mantisbt-cloned-info-disc(80070)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070" }, { "name": "[oss-security] 20121114 Re: CVE request: mantis before 1.2.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14704" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "core/email_api.php in MantisBT before 1.2.12 does not properly manage the sending of e-mail notifications about restricted bugs, which might allow remote authenticated users to obtain sensitive information by adding a note to a bug before losing permission to view that bug." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "56520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56520" }, { "name": "mantisbt-cloned-info-disc(80070)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80070" }, { "name": "[oss-security] 20121114 Re: CVE request: mantis before 1.2.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/11/14/1" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=150" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14704" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-5523", "datePublished": "2012-11-16T00:00:00", "dateReserved": "2012-10-24T00:00:00", "dateUpdated": "2024-08-06T21:05:47.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4460
Vulnerability from cvelistv5
Published
2014-01-10 15:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inject arbitrary web script or HTML via a project name.
References
▼ | URL | Tags |
---|---|---|
http://www.mantisbt.org/bugs/view.php?id=16513 | x_refsource_CONFIRM | |
http://osvdb.org/98823 | vdb-entry, x_refsource_OSVDB | |
https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2013/q4/168 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/55305 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16513" }, { "name": "98823", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/98823" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" }, { "name": "[oss-security] 20131022 Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q4/168" }, { "name": "55305", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55305" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inject arbitrary web script or HTML via a project name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-10T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16513" }, { "name": "98823", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/98823" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/0002d106a6cd35cb0a6fe03246531a4e3f32c9d0#diff-4122320b011a3291cd45da074a867076" }, { "name": "[oss-security] 20131022 Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q4/168" }, { "name": "55305", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55305" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4460", "datePublished": "2014-01-10T15:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9571
Vulnerability from cvelistv5
Published
2015-01-26 15:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1031633 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100209 | vdb-entry, x_refsource_XF | |
https://github.com/mantisbt/mantisbt/commit/132cd6d0 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/6d47c047 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17938 | x_refsource_CONFIRM | |
https://www.htbridge.com/advisory/HTB23243 | x_refsource_MISC | |
http://seclists.org/oss-sec/2015/q1/156 | mailing-list, x_refsource_MLIST | |
https://www.mantisbt.org/bugs/view.php?id=17937 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.726Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "mantisbt-cve20149571-xss(100209)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100209" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/132cd6d0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/6d47c047" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17938" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "name": "[oss-security] 20150117 CVE-2014-9571: XSS in install.php", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2015/q1/156" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "mantisbt-cve20149571-xss(100209)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100209" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/132cd6d0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/6d47c047" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17938" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "name": "[oss-security] 20150117 CVE-2014-9571: XSS in install.php", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2015/q1/156" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031633" }, { "name": "mantisbt-cve20149571-xss(100209)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100209" }, { "name": "https://github.com/mantisbt/mantisbt/commit/132cd6d0", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/132cd6d0" }, { "name": "https://github.com/mantisbt/mantisbt/commit/6d47c047", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/6d47c047" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17938", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17938" }, { "name": "https://www.htbridge.com/advisory/HTB23243", "refsource": "MISC", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "name": "[oss-security] 20150117 CVE-2014-9571: XSS in install.php", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q1/156" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17937", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9571", "datePublished": "2015-01-26T15:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T13:47:41.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9506
Vulnerability from cvelistv5
Published
2015-01-04 21:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.18 does not properly check permissions when sending an email that indicates when a monitored issue is related to another issue, which allows remote authenticated users to obtain sensitive information about restricted issues.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2014/q4/955 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
https://www.mantisbt.org/bugs/changelog_page.php?version_id=191 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=9885 | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=9885" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.18 does not properly check permissions when sending an email that indicates when a monitored issue is related to another issue, which allows remote authenticated users to obtain sensitive information about restricted issues." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=9885" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9506", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.2.18 does not properly check permissions when sending an email that indicates when a monitored issue is related to another issue, which allows remote authenticated users to obtain sensitive information about restricted issues." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=9885", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=9885" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9506", "datePublished": "2015-01-04T21:00:00", "dateReserved": "2015-01-04T00:00:00", "dateUpdated": "2024-08-06T13:47:41.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1118
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:45
Severity ?
EPSS score ?
Summary
The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.487Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48258" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=10124" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48258" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=10124" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1118", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28508
Vulnerability from cvelistv5
Published
2022-05-04 13:50
Modified
2024-08-03 05:56
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/ | x_refsource_MISC | |
https://sourceforge.net/projects/mantisbt/ | x_refsource_MISC | |
https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:56:15.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sourceforge.net/projects/mantisbt/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-04T13:50:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sourceforge.net/projects/mantisbt/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-28508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/", "refsource": "MISC", "url": "https://mantisbt.org/" }, { "name": "https://sourceforge.net/projects/mantisbt/", "refsource": "MISC", "url": "https://sourceforge.net/projects/mantisbt/" }, { "name": "https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability", "refsource": "MISC", "url": "https://github.com/YavuzSahbaz/CVE-2022-28508/blob/main/MantisBT%202.25.2%20XSS%20vulnurability" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28508", "datePublished": "2022-05-04T13:50:55", "dateReserved": "2022-04-04T00:00:00", "dateUpdated": "2024-08-03T05:56:15.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-16266
Vulnerability from cvelistv5
Published
2020-08-12 12:59
Modified
2024-08-04 13:37
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in MantisBT before 2.24.2. Improper escaping on view_all_bug_page.php allows a remote attacker to inject arbitrary HTML into the page by saving it into a text Custom Field, leading to possible code execution in the browser of any user subsequently viewing the issue (if CSP settings allow it).
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27056 | x_refsource_CONFIRM | |
https://mantisbt.org/blog/archives/mantisbt/665 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:54.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/665" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-08-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in MantisBT before 2.24.2. Improper escaping on view_all_bug_page.php allows a remote attacker to inject arbitrary HTML into the page by saving it into a text Custom Field, leading to possible code execution in the browser of any user subsequently viewing the issue (if CSP settings allow it)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-12T12:59:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=27056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/665" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-16266", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in MantisBT before 2.24.2. Improper escaping on view_all_bug_page.php allows a remote attacker to inject arbitrary HTML into the page by saving it into a text Custom Field, leading to possible code execution in the browser of any user subsequently viewing the issue (if CSP settings allow it)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27056", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=27056" }, { "name": "https://mantisbt.org/blog/archives/mantisbt/665", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/665" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-16266", "datePublished": "2020-08-12T12:59:54", "dateReserved": "2020-08-03T00:00:00", "dateUpdated": "2024-08-04T13:37:54.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-9839
Vulnerability from cvelistv5
Published
2019-06-06 18:17
Modified
2024-08-05 07:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=24221 | x_refsource_MISC | |
https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:24:56.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=24221" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the \u0027m_id\u0027 parameter), any user with REPORTER access or above is able to view any private issue\u0027s details (summary, description, steps to reproduce, additional information) when cloning it. By checking the \u0027Copy issue notes\u0027 and \u0027Copy attachments\u0027 checkboxes and completing the clone operation, this data also becomes public (except private notes)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-06T18:17:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=24221" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-9839", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the \u0027m_id\u0027 parameter), any user with REPORTER access or above is able to view any private issue\u0027s details (summary, description, steps to reproduce, additional information) when cloning it. By checking the \u0027Copy issue notes\u0027 and \u0027Copy attachments\u0027 checkboxes and completing the clone operation, this data also becomes public (except private notes)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=24221", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=24221" }, { "name": "https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-9839", "datePublished": "2019-06-06T18:17:04", "dateReserved": "2018-04-07T00:00:00", "dateUpdated": "2024-08-05T07:24:56.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1931
Vulnerability from cvelistv5
Published
2019-10-31 19:05
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows remote attackers to inject arbitrary web script or HTML via a version, related to deleting a version.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1931 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1931 | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/04/06/4 | x_refsource_MISC | |
http://www.securityfocus.com/bid/58889 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=15511 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1931" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1931" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58889" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=15511" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisBT", "vendor": "mantisBT", "versions": [ { "status": "affected", "version": "1.2.14" } ] } ], "datePublic": "2013-02-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows remote attackers to inject arbitrary web script or HTML via a version, related to deleting a version." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T19:05:05", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1931" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1931" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103438.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103459.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/58889" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=15511" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1931", "datePublished": "2019-10-31T19:05:05", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6316
Vulnerability from cvelistv5
Published
2014-12-12 11:00
Modified
2024-08-06 12:10
Severity ?
EPSS score ?
Summary
core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=17648 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99128 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/71478 | vdb-entry, x_refsource_BID | |
https://github.com/mantisbt/mantisbt/commit/e66ecc9f | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/931 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/03/11 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:10:13.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17648" }, { "name": "mantisbt-cve20146316-open-redirect(99128)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128" }, { "name": "71478", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71478" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f" }, { "name": "[oss-security] 20141205 RE: CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/931" }, { "name": "[oss-security] 20141202 CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/03/11" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17648" }, { "name": "mantisbt-cve20146316-open-redirect(99128)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128" }, { "name": "71478", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71478" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f" }, { "name": "[oss-security] 20141205 RE: CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/931" }, { "name": "[oss-security] 20141202 CVE-2014-6316: URL redirection issue in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/03/11" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=17648", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17648" }, { "name": "mantisbt-cve20146316-open-redirect(99128)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128" }, { "name": "71478", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71478" }, { "name": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f" }, { "name": "[oss-security] 20141205 RE: CVE-2014-6316: URL redirection issue in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/931" }, { "name": "[oss-security] 20141202 CVE-2014-6316: URL redirection issue in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/03/11" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6316", "datePublished": "2014-12-12T11:00:00", "dateReserved": "2014-09-11T00:00:00", "dateUpdated": "2024-08-06T12:10:13.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6382
Vulnerability from cvelistv5
Published
2018-01-30 06:00
Modified
2024-08-05 06:01
Severity ?
EPSS score ?
Summary
MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass
References
▼ | URL | Tags |
---|---|---|
http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=23908 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:49.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=23908" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-07T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=23908" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908", "refsource": "MISC", "url": "http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908" }, { "name": "https://mantisbt.org/bugs/view.php?id=23908", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=23908" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6382", "datePublished": "2018-01-30T06:00:00", "dateReserved": "2018-01-29T00:00:00", "dateUpdated": "2024-08-05T06:01:49.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4348
Vulnerability from cvelistv5
Published
2011-01-03 19:26
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "name": "[oss-security] 20101216 Re: CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "name": "[oss-security] 20101215 CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-12T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "name": "[oss-security] 20101216 Re: CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "name": "[oss-security] 20101215 CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4348", "datePublished": "2011-01-03T19:26:00", "dateReserved": "2010-11-30T00:00:00", "dateUpdated": "2024-08-07T03:43:14.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8987
Vulnerability from cvelistv5
Published
2015-08-24 15:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the "set configuration" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/11/15/2 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/49c3d089 | x_refsource_CONFIRM | |
http://www.mantisbt.org/bugs/view.php?id=17870 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/11/15/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/11/19/21 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/11/14/9 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/11/15/4 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:13.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/49c3d089" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17870" }, { "name": "[oss-security] 20141115 Re: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "name": "[oss-security] 20141119 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/19/21" }, { "name": "[oss-security] 20141114 CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/14/9" }, { "name": "[oss-security] 20141115 Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the \"set configuration\" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-08-24T14:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/49c3d089" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17870" }, { "name": "[oss-security] 20141115 Re: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "name": "[oss-security] 20141119 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/19/21" }, { "name": "[oss-security] 20141114 CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/14/9" }, { "name": "[oss-security] 20141115 Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the \"set configuration\" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "name": "https://github.com/mantisbt/mantisbt/commit/49c3d089", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/49c3d089" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17870", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17870" }, { "name": "[oss-security] 20141115 Re: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "name": "[oss-security] 20141119 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/19/21" }, { "name": "[oss-security] 20141114 CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/14/9" }, { "name": "[oss-security] 20141115 Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8987", "datePublished": "2015-08-24T15:00:00", "dateReserved": "2014-11-19T00:00:00", "dateUpdated": "2024-08-06T13:33:13.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12061
Vulnerability from cvelistv5
Published
2017-08-01 15:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/08/01/1 | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=23146 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039030 | vdb-entry, x_refsource_SECTRACK | |
https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2017/08/01/2 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:15.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=23146" }, { "name": "1039030", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-02T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=23146" }, { "name": "1039030", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/08/01/1", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "name": "https://mantisbt.org/bugs/view.php?id=23146", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=23146" }, { "name": "1039030", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039030" }, { "name": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0" }, { "name": "http://openwall.com/lists/oss-security/2017/08/01/2", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "name": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12061", "datePublished": "2017-08-01T15:00:00", "dateReserved": "2017-07-31T00:00:00", "dateUpdated": "2024-08-05T18:28:15.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9117
Vulnerability from cvelistv5
Published
2014-12-06 21:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/71321 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99004 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2014/11/26/19 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/11/27/8 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
https://www.mantisbt.org/bugs/view.php?id=17811 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/7bb78e45 | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:13.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "71321", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71321" }, { "name": "mantisbt-cve20149117-sec-bypass(99004)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99004" }, { "name": "[oss-security] 20141126 CVE Request: CAPTCHA bypass in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/26/19" }, { "name": "[oss-security] 20141126 Re: CVE Request: CAPTCHA bypass in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/27/8" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17811" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7bb78e45" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "71321", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71321" }, { "name": "mantisbt-cve20149117-sec-bypass(99004)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99004" }, { "name": "[oss-security] 20141126 CVE Request: CAPTCHA bypass in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/26/19" }, { "name": "[oss-security] 20141126 Re: CVE Request: CAPTCHA bypass in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/27/8" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17811" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/7bb78e45" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "71321", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71321" }, { "name": "mantisbt-cve20149117-sec-bypass(99004)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99004" }, { "name": "[oss-security] 20141126 CVE Request: CAPTCHA bypass in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/26/19" }, { "name": "[oss-security] 20141126 Re: CVE Request: CAPTCHA bypass in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/27/8" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17811", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17811" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7bb78e45", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/7bb78e45" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9117", "datePublished": "2014-12-06T21:00:00", "dateReserved": "2014-11-26T00:00:00", "dateUpdated": "2024-08-06T13:33:13.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7620
Vulnerability from cvelistv5
Published
2017-05-21 14:00
Modified
2024-08-05 16:12
Severity ?
EPSS score ?
Summary
MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=22816 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038538 | vdb-entry, x_refsource_SECTRACK | |
https://www.exploit-db.com/exploits/42043/ | exploit, x_refsource_EXPLOIT-DB | |
https://mantisbt.org/bugs/view.php?id=22702 | x_refsource_CONFIRM | |
http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:27.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=22816" }, { "name": "1038538", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038538" }, { "name": "42043", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42043/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=22702" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \\/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-07T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=22816" }, { "name": "1038538", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038538" }, { "name": "42043", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42043/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=22702" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \\/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=22816", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=22816" }, { "name": "1038538", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038538" }, { "name": "42043", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42043/" }, { "name": "https://mantisbt.org/bugs/view.php?id=22702", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=22702" }, { "name": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt", "refsource": "MISC", "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7620", "datePublished": "2017-05-21T14:00:00", "dateReserved": "2017-04-10T00:00:00", "dateUpdated": "2024-08-05T16:12:27.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9271
Vulnerability from cvelistv5
Published
2015-01-09 18:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in file_download.php in MantisBT before 1.2.18 allows remote authenticated users to inject arbitrary web script or HTML via a Flash file with an image extension, related to inline attachments, as demonstrated by a .swf.jpeg filename.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/867 | mailing-list, x_refsource_MLIST | |
https://www.mantisbt.org/bugs/view.php?id=17874 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/902 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q4/924 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/9fb8cf36f | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:25.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17874" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in file_download.php in MantisBT before 1.2.18 allows remote authenticated users to inject arbitrary web script or HTML via a Flash file with an image extension, related to inline attachments, as demonstrated by a .swf.jpeg filename." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17874" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in file_download.php in MantisBT before 1.2.18 allows remote authenticated users to inject arbitrary web script or HTML via a Flash file with an image extension, related to inline attachments, as demonstrated by a .swf.jpeg filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17874", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17874" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "name": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9271", "datePublished": "2015-01-09T18:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:25.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44394
Vulnerability from cvelistv5
Published
2023-10-16 21:00
Modified
2024-09-13 18:59
Severity ?
EPSS score ?
Summary
MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`).
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=32981 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:07:33.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m" }, { "name": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1" }, { "name": "https://mantisbt.org/bugs/view.php?id=32981", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=32981" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44394", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T18:58:41.131236Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T18:59:53.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.258" } ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects\u0027 names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T21:00:46.324Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m" }, { "name": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1" }, { "name": "https://mantisbt.org/bugs/view.php?id=32981", "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=32981" } ], "source": { "advisory": "GHSA-v642-mh27-8j6m", "discovery": "UNKNOWN" }, "title": "Disclosure of project names to unauthorized users in MantisBT" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-44394", "datePublished": "2023-10-16T21:00:46.324Z", "dateReserved": "2023-09-28T17:56:32.614Z", "dateUpdated": "2024-09-13T18:59:53.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3357
Vulnerability from cvelistv5
Published
2011-09-21 16:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8392" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "name": "DSA-2308", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "[oss-security] 20110904 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "name": "45961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45961" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49448" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "mantisbt-action-file-include(69588)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8392" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "name": "DSA-2308", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "[oss-security] 20110904 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "name": "45961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45961" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49448" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "mantisbt-action-file-include(69588)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3357", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8392", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8392" }, { "name": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "name": "DSA-2308", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html", "refsource": "MISC", "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "[oss-security] 20110904 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "name": "45961", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45961" }, { "name": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=735514", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49448" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=13281", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "mantisbt-action-file-include(69588)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "refsource": "MLIST", "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3357", "datePublished": "2011-09-21T16:00:00", "dateReserved": "2011-08-30T00:00:00", "dateUpdated": "2024-08-06T23:29:56.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2802
Vulnerability from cvelistv5
Published
2019-11-09 02:12
Modified
2024-08-07 06:07
Severity ?
EPSS score ?
Summary
MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2009-2802 | x_refsource_MISC | |
https://mantisbt.org/blog/archives/mantisbt/113 | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=11952 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:35.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-2802" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=11952" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-09T02:12:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-2802" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=11952" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2802", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2009-2802", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2009-2802" }, { "name": "https://mantisbt.org/blog/archives/mantisbt/113", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/113" }, { "name": "https://mantisbt.org/bugs/view.php?id=11952", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=11952" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2802", "datePublished": "2019-11-09T02:12:21", "dateReserved": "2009-08-17T00:00:00", "dateUpdated": "2024-08-07T06:07:35.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1123
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:45
Severity ?
EPSS score ?
Summary
The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/f5106be52cf6aa72c521f388e4abb5f0de1f1d7f" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13901" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/f5106be52cf6aa72c521f388e4abb5f0de1f1d7f" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13901" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48258" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1123", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12419
Vulnerability from cvelistv5
Published
2017-08-05 15:00
Modified
2024-08-05 18:36
Severity ?
EPSS score ?
Summary
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=23173 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100142 | vdb-entry, x_refsource_BID | |
http://openwall.com/lists/oss-security/2017/08/04/6 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:56.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "name": "100142", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100142" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "name": "100142", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100142" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=23173", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "name": "100142", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100142" }, { "name": "http://openwall.com/lists/oss-security/2017/08/04/6", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/08/04/6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12419", "datePublished": "2017-08-05T15:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:36:56.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17783
Vulnerability from cvelistv5
Published
2018-10-30 18:00
Modified
2024-08-05 10:54
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the Edit Filter page (manage_filter_edit page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/blog/archives/mantisbt/613 | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=24814 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:54:10.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=24814" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Edit Filter page (manage_filter_edit page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-30T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=24814" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17783", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the Edit Filter page (manage_filter_edit page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/blog/archives/mantisbt/613", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "name": "https://mantisbt.org/bugs/view.php?id=24814", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=24814" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17783", "datePublished": "2018-10-30T18:00:00", "dateReserved": "2018-09-29T00:00:00", "dateUpdated": "2024-08-05T10:54:10.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7309
Vulnerability from cvelistv5
Published
2017-03-31 04:26
Modified
2024-08-05 15:56
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted 'config_option' parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3.
References
▼ | URL | Tags |
---|---|---|
http://www.mantisbt.org/bugs/view.php?id=22579 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2017/03/30/4 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038169 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/97251 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22579" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038169" }, { "name": "97251", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97251" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted \u0027config_option\u0027 parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22579" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038169" }, { "name": "97251", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97251" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted \u0027config_option\u0027 parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mantisbt.org/bugs/view.php?id=22579", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=22579" }, { "name": "http://openwall.com/lists/oss-security/2017/03/30/4", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038169" }, { "name": "97251", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97251" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7309", "datePublished": "2017-03-31T04:26:00", "dateReserved": "2017-03-29T00:00:00", "dateUpdated": "2024-08-05T15:56:36.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-13055
Vulnerability from cvelistv5
Published
2018-08-03 18:00
Modified
2024-08-05 08:52
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) in MantisBT 2.1.0 through 2.15.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/blog/archives/mantisbt/602 | x_refsource_CONFIRM | |
http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=24580 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:52:49.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=24580" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) in MantisBT 2.1.0 through 2.15.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-03T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=24580" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-13055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) in MantisBT 2.1.0 through 2.15.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/blog/archives/mantisbt/602", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "name": "http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a", "refsource": "CONFIRM", "url": "http://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a" }, { "name": "https://mantisbt.org/bugs/view.php?id=24580", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=24580" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-13055", "datePublished": "2018-08-03T18:00:00", "dateReserved": "2018-07-02T00:00:00", "dateUpdated": "2024-08-05T08:52:49.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9388
Vulnerability from cvelistv5
Published
2014-12-17 19:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2014/q4/955 | mailing-list, x_refsource_MLIST | |
https://www.mantisbt.org/bugs/view.php?id=17878 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
https://www.mantisbt.org/bugs/changelog_page.php?version_id=191 | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:25.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17878" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-07T00:00:00", "descriptions": [ { "lang": "en", "value": "bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17878" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141207 MantisBT 1.2.18 Released", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/955" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17878", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17878" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9388", "datePublished": "2014-12-17T19:00:00", "dateReserved": "2014-12-17T00:00:00", "dateUpdated": "2024-08-06T13:40:25.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12062
Vulnerability from cvelistv5
Published
2017-08-01 15:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in manage_user_page.php in MantisBT 2.x before 2.5.2. The 'filter' field is not sanitized before being rendered in the Manage User page, allowing remote attackers to execute arbitrary JavaScript code if CSP is disabled.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/08/01/1 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039030 | vdb-entry, x_refsource_SECTRACK | |
https://mantisbt.org/bugs/view.php?id=23166 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2017/08/01/2 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:15.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "name": "1039030", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=23166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in manage_user_page.php in MantisBT 2.x before 2.5.2. The \u0027filter\u0027 field is not sanitized before being rendered in the Manage User page, allowing remote attackers to execute arbitrary JavaScript code if CSP is disabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-02T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "name": "1039030", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=23166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12062", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in manage_user_page.php in MantisBT 2.x before 2.5.2. The \u0027filter\u0027 field is not sanitized before being rendered in the Manage User page, allowing remote attackers to execute arbitrary JavaScript code if CSP is disabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/08/01/1", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/08/01/1" }, { "name": "1039030", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039030" }, { "name": "https://mantisbt.org/bugs/view.php?id=23166", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=23166" }, { "name": "http://openwall.com/lists/oss-security/2017/08/01/2", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/08/01/2" }, { "name": "https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/9b5b71dadbeeeec27efea59f562ac5bd6d2673b7" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12062", "datePublished": "2017-08-01T15:00:00", "dateReserved": "2017-07-31T00:00:00", "dateUpdated": "2024-08-05T18:28:15.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9089
Vulnerability from cvelistv5
Published
2014-11-28 15:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=17841 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/71298 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2014/11/25/14 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN | |
http://www.openwall.com/lists/oss-security/2014/11/26/6 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:13.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17841" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "71298", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71298" }, { "name": "[oss-security] 20141126 CVE Request: MantisBT SQL injection in view_all_set.php", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/25/14" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "[oss-security] 20141126 Re: CVE Request: MantisBT SQL injection in view_all_set.php", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/26/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17841" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "71298", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71298" }, { "name": "[oss-security] 20141126 CVE Request: MantisBT SQL injection in view_all_set.php", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/25/14" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "[oss-security] 20141126 Re: CVE Request: MantisBT SQL injection in view_all_set.php", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/26/6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=17841", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17841" }, { "name": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "71298", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71298" }, { "name": "[oss-security] 20141126 CVE Request: MantisBT SQL injection in view_all_set.php", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/25/14" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "[oss-security] 20141126 Re: CVE Request: MantisBT SQL injection in view_all_set.php", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/26/6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9089", "datePublished": "2014-11-28T15:00:00", "dateReserved": "2014-11-26T00:00:00", "dateUpdated": "2024-08-06T13:33:13.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1810
Vulnerability from cvelistv5
Published
2014-05-15 14:00
Modified
2024-08-06 15:13
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in core/summary_api.php in MantisBT 1.2.12 allow remote authenticated users with manager or administrator permissions to inject arbitrary web script or HTML via a (1) category name in the summary_print_by_category function or (2) project name in the summary_print_by_project function.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q1/127 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2013/q1/556 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/51853 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mantisbt.org/bugs/view.php?id=15384 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.268Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130119 CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q1/127" }, { "name": "[oss-security] 20130302 Re: CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q1/556" }, { "name": "51853", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51853" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15384" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in core/summary_api.php in MantisBT 1.2.12 allow remote authenticated users with manager or administrator permissions to inject arbitrary web script or HTML via a (1) category name in the summary_print_by_category function or (2) project name in the summary_print_by_project function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-15T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130119 CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q1/127" }, { "name": "[oss-security] 20130302 Re: CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q1/556" }, { "name": "51853", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51853" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15384" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in core/summary_api.php in MantisBT 1.2.12 allow remote authenticated users with manager or administrator permissions to inject arbitrary web script or HTML via a (1) category name in the summary_print_by_category function or (2) project name in the summary_print_by_project function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130119 CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q1/127" }, { "name": "[oss-security] 20130302 Re: CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q1/556" }, { "name": "51853", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51853" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=15384", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=15384" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1810", "datePublished": "2014-05-15T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3578
Vulnerability from cvelistv5
Published
2011-09-21 16:00
Modified
2024-08-06 23:37
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:48.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8392" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "name": "DSA-2308", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "[oss-security] 20110904 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "name": "45961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45961" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49448" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8392" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "name": "DSA-2308", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "[oss-security] 20110904 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "name": "45961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45961" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49448" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8392", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8392" }, { "name": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f" }, { "name": "DSA-2308", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html", "refsource": "MISC", "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "[oss-security] 20110904 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/2" }, { "name": "45961", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45961" }, { "name": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=735514", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49448" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=13281", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=13281" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "refsource": "MLIST", "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3578", "datePublished": "2011-09-21T16:00:00", "dateReserved": "2011-09-21T00:00:00", "dateUpdated": "2024-08-06T23:37:48.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9759
Vulnerability from cvelistv5
Published
2016-04-11 21:00
Modified
2024-08-06 13:55
Severity ?
EPSS score ?
Summary
Incomplete blacklist vulnerability in the config_is_private function in config_api.php in MantisBT 1.3.x before 1.3.0 allows remote attackers to obtain sensitive master salt configuration information via a SOAP API request.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/01/03/2 | mailing-list, x_refsource_MLIST | |
https://mantisbt.org/bugs/view.php?id=20277 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2016/01/02/1 | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1035518 | vdb-entry, x_refsource_SECTRACK | |
http://sourceforge.net/p/mantisbt/mailman/message/32948048/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:55:04.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160103 Re: CVE Request: MantisBT SOAP API can be used to disclose confidential settings", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/03/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=20277" }, { "name": "[oss-security] 20160102 CVE Request: MantisBT SOAP API can be used to disclose confidential settings", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/02/1" }, { "name": "1035518", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035518" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/p/mantisbt/mailman/message/32948048/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in the config_is_private function in config_api.php in MantisBT 1.3.x before 1.3.0 allows remote attackers to obtain sensitive master salt configuration information via a SOAP API request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160103 Re: CVE Request: MantisBT SOAP API can be used to disclose confidential settings", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/03/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=20277" }, { "name": "[oss-security] 20160102 CVE Request: MantisBT SOAP API can be used to disclose confidential settings", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/02/1" }, { "name": "1035518", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035518" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/p/mantisbt/mailman/message/32948048/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in the config_is_private function in config_api.php in MantisBT 1.3.x before 1.3.0 allows remote attackers to obtain sensitive master salt configuration information via a SOAP API request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160103 Re: CVE Request: MantisBT SOAP API can be used to disclose confidential settings", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/03/2" }, { "name": "https://mantisbt.org/bugs/view.php?id=20277", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=20277" }, { "name": "[oss-security] 20160102 CVE Request: MantisBT SOAP API can be used to disclose confidential settings", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/02/1" }, { "name": "1035518", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035518" }, { "name": "http://sourceforge.net/p/mantisbt/mailman/message/32948048/", "refsource": "CONFIRM", "url": "http://sourceforge.net/p/mantisbt/mailman/message/32948048/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9759", "datePublished": "2016-04-11T21:00:00", "dateReserved": "2016-01-03T00:00:00", "dateUpdated": "2024-08-06T13:55:04.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35571
Vulnerability from cvelistv5
Published
2021-02-22 02:23
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27768 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:13.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27768" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-22T02:23:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27768" } ], "source": { "discovery": "INTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27768", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27768" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35571", "datePublished": "2021-02-22T02:23:53", "dateReserved": "2020-12-20T00:00:00", "dateUpdated": "2024-08-04T17:09:13.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1120
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:45
Severity ?
EPSS score ?
Summary
The SOAP API in MantisBT before 1.2.9 does not properly enforce the bugnote_allow_user_edit_delete and delete_bug_threshold permissions, which allows remote authenticated users with read and write SOAP API privileges to delete arbitrary bug reports and bug notes.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13656" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/df7782a65e96aa1c9639a7625a658102134c7fe0" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The SOAP API in MantisBT before 1.2.9 does not properly enforce the bugnote_allow_user_edit_delete and delete_bug_threshold permissions, which allows remote authenticated users with read and write SOAP API privileges to delete arbitrary bug reports and bug notes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13656" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/df7782a65e96aa1c9639a7625a658102134c7fe0" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48258" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1120", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2046
Vulnerability from cvelistv5
Published
2017-08-28 15:00
Modified
2024-08-06 05:02
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and later before 1.2.20.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1191130 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/02/21/2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/02/21/1 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:02:43.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191130" }, { "name": "[oss-security] 20150221 RE: CVE request: XSS in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/2" }, { "name": "[oss-security] 20150220 Re: CVE request: XSS in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and later before 1.2.20." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191130" }, { "name": "[oss-security] 20150221 RE: CVE request: XSS in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/2" }, { "name": "[oss-security] 20150220 Re: CVE request: XSS in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/02/21/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and later before 1.2.20." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1191130", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191130" }, { "name": "[oss-security] 20150221 RE: CVE request: XSS in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/02/21/2" }, { "name": "[oss-security] 20150220 Re: CVE request: XSS in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/02/21/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2046", "datePublished": "2017-08-28T15:00:00", "dateReserved": "2015-02-20T00:00:00", "dateUpdated": "2024-08-06T05:02:43.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29603
Vulnerability from cvelistv5
Published
2021-01-29 06:41
Modified
2024-08-04 16:55
Severity ?
EPSS score ?
Summary
In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects' names via the manage_proj_edit_page.php project_id parameter, without having access to them.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27726 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=27357 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27726" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects\u0027 names via the manage_proj_edit_page.php project_id parameter, without having access to them." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-29T06:41:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27726" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29603", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects\u0027 names via the manage_proj_edit_page.php project_id parameter, without having access to them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27726", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27726" }, { "name": "https://mantisbt.org/bugs/view.php?id=27357", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27357" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29603", "datePublished": "2021-01-29T06:41:36", "dateReserved": "2020-12-07T00:00:00", "dateUpdated": "2024-08-04T16:55:10.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1883
Vulnerability from cvelistv5
Published
2014-05-27 15:00
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
Mantis Bug Tracker (aka MantisBT) 1.2.12 before 1.2.15 allows remote attackers to cause a denial of service (resource consumption) via a filter using a criteria, text search, and the "any condition" match type.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2013/03/22/2 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/d16988c3ca232a7 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83347 | vdb-entry, x_refsource_XF | |
https://bugzilla.redhat.com/show_bug.cgi?id=924340 | x_refsource_CONFIRM | |
http://www.mantisbt.org/bugs/view.php?id=15573 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/58626 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:36.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130322 Re: CVE request: MantisBT text search query can crash site", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/22/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/d16988c3ca232a7" }, { "name": "mantisbt-filterapi-dos(83347)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83347" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=924340" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15573" }, { "name": "58626", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58626" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mantis Bug Tracker (aka MantisBT) 1.2.12 before 1.2.15 allows remote attackers to cause a denial of service (resource consumption) via a filter using a criteria, text search, and the \"any condition\" match type." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130322 Re: CVE request: MantisBT text search query can crash site", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/22/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/d16988c3ca232a7" }, { "name": "mantisbt-filterapi-dos(83347)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83347" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=924340" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15573" }, { "name": "58626", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/58626" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1883", "datePublished": "2014-05-27T15:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:36.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6973
Vulnerability from cvelistv5
Published
2017-03-31 04:26
Modified
2024-08-05 15:49
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/03/30/4 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038169 | vdb-entry, x_refsource_SECTRACK | |
http://www.mantisbt.org/bugs/view.php?id=22537 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/97252 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:49:02.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038169" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22537" }, { "name": "97252", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97252" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted \u0027action\u0027 parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038169" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22537" }, { "name": "97252", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97252" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-6973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted \u0027action\u0027 parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/03/30/4", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038169" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=22537", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=22537" }, { "name": "97252", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97252" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-6973", "datePublished": "2017-03-31T04:26:00", "dateReserved": "2017-03-17T00:00:00", "dateUpdated": "2024-08-05T15:49:02.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16514
Vulnerability from cvelistv5
Published
2019-06-20 13:18
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=24731 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=24731" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T13:18:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=24731" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=24731", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=24731" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16514", "datePublished": "2019-06-20T13:18:36", "dateReserved": "2018-09-05T00:00:00", "dateUpdated": "2024-08-05T10:24:32.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28413
Vulnerability from cvelistv5
Published
2020-12-30 21:28
Modified
2024-08-04 16:33
Severity ?
EPSS score ?
Summary
In MantisBT 2.24.3, SQL Injection can occur in the parameter "access" of the mc_project_get_users function through the API SOAP.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:59.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "In MantisBT 2.24.3, SQL Injection can occur in the parameter \"access\" of the mc_project_get_users function through the API SOAP." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:H/AV:N/A:N/C:H/I:N/PR:L/S:U/UI:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T17:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-28413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MantisBT 2.24.3, SQL Injection can occur in the parameter \"access\" of the mc_project_get_users function through the API SOAP." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:H/AV:N/A:N/C:H/I:N/PR:L/S:U/UI:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d", "refsource": "MISC", "url": "https://ethicalhcop.medium.com/cve-2020-28413-blind-sql-injection-en-mantis-bug-tracker-2-24-3-api-soap-54238f8e046d" }, { "name": "http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160750/Mantis-Bug-Tracker-2.24.3-SQL-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-28413", "datePublished": "2020-12-30T21:28:21", "dateReserved": "2020-11-10T00:00:00", "dateUpdated": "2024-08-04T16:33:59.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7241
Vulnerability from cvelistv5
Published
2017-03-31 04:26
Modified
2024-08-05 15:56
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/03/30/4 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038169 | vdb-entry, x_refsource_SECTRACK | |
http://www.mantisbt.org/bugs/view.php?id=22568 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/97253 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038169" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22568" }, { "name": "97253", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97253" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted \u0027type\u0027 parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the \"Post-installation and upgrade tasks\" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038169" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22568" }, { "name": "97253", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97253" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7241", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted \u0027type\u0027 parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the \"Post-installation and upgrade tasks\" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/03/30/4", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/03/30/4" }, { "name": "1038169", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038169" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=22568", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=22568" }, { "name": "97253", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97253" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7241", "datePublished": "2017-03-31T04:26:00", "dateReserved": "2017-03-23T00:00:00", "dateUpdated": "2024-08-05T15:56:36.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2574
Vulnerability from cvelistv5
Published
2010-08-09 20:00
Modified
2024-08-07 02:39
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-103/" }, { "name": "FEDORA-2010-15080", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "name": "FEDORA-2010-15082", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "name": "41653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41653" }, { "name": "ADV-2010-2535", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "name": "40832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40832" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "20100805 Secunia Research: MantisBT \"Add Category\" Script Insertion Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/512886/100/0/threaded" }, { "name": "FEDORA-2010-15061", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12230" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-103/" }, { "name": "FEDORA-2010-15080", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "name": "FEDORA-2010-15082", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "name": "41653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41653" }, { "name": "ADV-2010-2535", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "name": "40832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40832" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "20100805 Secunia Research: MantisBT \"Add Category\" Script Insertion Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/512886/100/0/threaded" }, { "name": "FEDORA-2010-15061", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12230" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/secunia_research/2010-103/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-103/" }, { "name": "FEDORA-2010-15080", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "name": "FEDORA-2010-15082", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "name": "41653", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41653" }, { "name": "ADV-2010-2535", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "name": "40832", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40832" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "20100805 Secunia Research: MantisBT \"Add Category\" Script Insertion Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/512886/100/0/threaded" }, { "name": "FEDORA-2010-15061", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=12230", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=12230" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2574", "datePublished": "2010-08-09T20:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8554
Vulnerability from cvelistv5
Published
2014-11-13 15:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2014/q4/487 | mailing-list, x_refsource_MLIST | |
http://www.mantisbt.org/bugs/view.php?id=17812 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/70856 | vdb-entry, x_refsource_BID | |
http://seclists.org/oss-sec/2014/q4/479 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98457 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mantisbt.org/bugs/view.php?id=16880 | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.523Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20141102 Re: SQL injection vulnerability in MantisBT SOAP API [CVE-2014-8554]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/487" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17812" }, { "name": "70856", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70856" }, { "name": "[oss-security] 20141030 RE: SQL injection vulnerability in MantisBT SOAP API", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/479" }, { "name": "mantisbt-cve20148554-sql-injection(98457)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20141102 Re: SQL injection vulnerability in MantisBT SOAP API [CVE-2014-8554]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/487" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17812" }, { "name": "70856", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70856" }, { "name": "[oss-security] 20141030 RE: SQL injection vulnerability in MantisBT SOAP API", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/479" }, { "name": "mantisbt-cve20148554-sql-injection(98457)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141102 Re: SQL injection vulnerability in MantisBT SOAP API [CVE-2014-8554]", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/487" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17812", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17812" }, { "name": "70856", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70856" }, { "name": "[oss-security] 20141030 RE: SQL injection vulnerability in MantisBT SOAP API", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/479" }, { "name": "mantisbt-cve20148554-sql-injection(98457)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=16880", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=16880" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8554", "datePublished": "2014-11-13T15:00:00", "dateReserved": "2014-10-30T00:00:00", "dateUpdated": "2024-08-06T13:18:48.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3763
Vulnerability from cvelistv5
Published
2010-10-05 21:00
Modified
2024-08-07 03:18
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.051Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "name": "43837", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43837" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12309" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "name": "43837", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43837" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12309" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0002", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "http://www.mantisbt.org/blog/?p=123", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/blog/?p=123" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "name": "FEDORA-2010-19078", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "name": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "name": "43837", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43837" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=12309", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=12309" }, { "name": "42772", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3763", "datePublished": "2010-10-05T21:00:00", "dateReserved": "2010-10-05T00:00:00", "dateUpdated": "2024-08-07T03:18:53.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34080
Vulnerability from cvelistv5
Published
2024-05-13 15:35
Modified
2024-08-02 02:42
Severity ?
EPSS score ?
Summary
MantisBT (Mantis Bug Tracker) is an open source issue tracker. If an issue references a note that belongs to another issue that the user doesn't have access to, then it gets hyperlinked. Clicking on the link gives an access denied error as expected, yet some information remains available via the link, link label, and tooltip. This can result in disclosure of the existence of the note, the note author name, the note creation timestamp, and the issue id the note belongs to. Version 2.26.2 contains a patch for the issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-99jc-wqmr-ff2q | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/pull/2000 | x_refsource_MISC | |
https://github.com/mantisbt/mantisbt/commit/0a50562369d823689c9b946066d1e49d3c2df226 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=34434 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:mantisbt:mantisbt:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "lessThan": "2.26.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34080", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-13T18:31:57.581342Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:59:48.416Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-99jc-wqmr-ff2q", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-99jc-wqmr-ff2q" }, { "name": "https://github.com/mantisbt/mantisbt/pull/2000", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/pull/2000" }, { "name": "https://github.com/mantisbt/mantisbt/commit/0a50562369d823689c9b946066d1e49d3c2df226", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/0a50562369d823689c9b946066d1e49d3c2df226" }, { "name": "https://mantisbt.org/bugs/view.php?id=34434", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=34434" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.26.2" } ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT (Mantis Bug Tracker) is an open source issue tracker. If an issue references a note that belongs to another issue that the user doesn\u0027t have access to, then it gets hyperlinked. Clicking on the link gives an access denied error as expected, yet some information remains available via the link, link label, and tooltip. This can result in disclosure of the existence of the note, the note author name, the note creation timestamp, and the issue id the note belongs to. Version 2.26.2 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-13T15:35:00.399Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-99jc-wqmr-ff2q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-99jc-wqmr-ff2q" }, { "name": "https://github.com/mantisbt/mantisbt/pull/2000", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/pull/2000" }, { "name": "https://github.com/mantisbt/mantisbt/commit/0a50562369d823689c9b946066d1e49d3c2df226", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/0a50562369d823689c9b946066d1e49d3c2df226" }, { "name": "https://mantisbt.org/bugs/view.php?id=34434", "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=34434" } ], "source": { "advisory": "GHSA-99jc-wqmr-ff2q", "discovery": "UNKNOWN" }, "title": "MantisBT Vulnerable to Exposure of Sensitive Information to an Unauthorized Actor" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34080", "datePublished": "2024-05-13T15:35:00.399Z", "dateReserved": "2024-04-30T06:56:33.384Z", "dateUpdated": "2024-08-02T02:42:59.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2238
Vulnerability from cvelistv5
Published
2014-03-05 15:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2014/q1/456 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q1/490 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/65903 | vdb-entry, x_refsource_BID | |
http://mantisbt.domainunion.de/bugs/view.php?id=17055 | x_refsource_CONFIRM | |
http://www.mantisbt.org/blog/?p=288 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91563 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140228 CVE request: MantisBT 1.2.13 SQL injection vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/456" }, { "name": "[oss-security] 20140304 Re: CVE request: MantisBT 1.2.13 SQL injection vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/490" }, { "name": "65903", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65903" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mantisbt.domainunion.de/bugs/view.php?id=17055" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/blog/?p=288" }, { "name": "mantisbt-admconfigreport-sql-injection(91563)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140228 CVE request: MantisBT 1.2.13 SQL injection vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/456" }, { "name": "[oss-security] 20140304 Re: CVE request: MantisBT 1.2.13 SQL injection vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/490" }, { "name": "65903", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65903" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mantisbt.domainunion.de/bugs/view.php?id=17055" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/blog/?p=288" }, { "name": "mantisbt-admconfigreport-sql-injection(91563)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140228 CVE request: MantisBT 1.2.13 SQL injection vulnerability", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q1/456" }, { "name": "[oss-security] 20140304 Re: CVE request: MantisBT 1.2.13 SQL injection vulnerability", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q1/490" }, { "name": "65903", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65903" }, { "name": "http://mantisbt.domainunion.de/bugs/view.php?id=17055", "refsource": "CONFIRM", "url": "http://mantisbt.domainunion.de/bugs/view.php?id=17055" }, { "name": "http://www.mantisbt.org/blog/?p=288", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/blog/?p=288" }, { "name": "mantisbt-admconfigreport-sql-injection(91563)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2238", "datePublished": "2014-03-05T15:00:00", "dateReserved": "2014-02-28T00:00:00", "dateUpdated": "2024-08-06T10:06:00.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22476
Vulnerability from cvelistv5
Published
2023-02-23 19:00
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. This issue is fixed in version 2.25.6. There are no workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=31086 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=31086", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=31086" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.25.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. This issue is fixed in version 2.25.6. There are no workarounds.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T19:00:02.754Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=31086", "tags": [ "x_refsource_MISC" ], "url": "https://www.mantisbt.org/bugs/view.php?id=31086" } ], "source": { "advisory": "GHSA-hf4x-6h87-hm79", "discovery": "UNKNOWN" }, "title": "MantisBT: Exposure of Private issues\u0027 summary to unauthorized users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22476", "datePublished": "2023-02-23T19:00:02.754Z", "dateReserved": "2022-12-29T17:41:28.087Z", "dateUpdated": "2024-08-02T10:13:48.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26144
Vulnerability from cvelistv5
Published
2022-04-13 13:54
Modified
2024-08-03 04:56
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=29688 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=29688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-13T13:54:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=29688" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-26144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=29688", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=29688" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-26144", "datePublished": "2022-04-13T13:54:05", "dateReserved": "2022-02-26T00:00:00", "dateUpdated": "2024-08-03T04:56:37.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9572
Vulnerability from cvelistv5
Published
2015-01-26 15:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1031633 | vdb-entry, x_refsource_SECTRACK | |
http://seclists.org/oss-sec/2015/q1/158 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100211 | vdb-entry, x_refsource_XF | |
https://www.htbridge.com/advisory/HTB23243 | x_refsource_MISC | |
https://www.mantisbt.org/bugs/view.php?id=17939 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17937 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150117 CVE-2014-9572: Improper Access Control in install.php", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2015/q1/158" }, { "name": "mantisbt-cve20149572-sec-bypass(100211)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100211" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17939" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150117 CVE-2014-9572: Improper Access Control in install.php", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2015/q1/158" }, { "name": "mantisbt-cve20149572-sec-bypass(100211)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100211" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17939" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150117 CVE-2014-9572: Improper Access Control in install.php", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q1/158" }, { "name": "mantisbt-cve20149572-sec-bypass(100211)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100211" }, { "name": "https://www.htbridge.com/advisory/HTB23243", "refsource": "MISC", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17939", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17939" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17937", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9572", "datePublished": "2015-01-26T15:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T13:47:41.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2802
Vulnerability from cvelistv5
Published
2010-09-07 16:30
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.2 allows remote authenticated users to inject arbitrary web script or HTML via an HTML document with a .gif filename extension, related to inline attachments.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2010/08/03/7 | mailing-list, x_refsource_MLIST | |
http://www.mantisbt.org/bugs/view.php?id=11952 | x_refsource_CONFIRM | |
http://www.mantisbt.org/blog/?p=113 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=620992 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2010/08/02/16 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20100803 Re: CVE request: Attachment XSS in mantis \u003c 1.2.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/08/03/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=11952" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/blog/?p=113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620992" }, { "name": "[oss-security] 20100803 CVE request: Attachment XSS in mantis \u003c 1.2.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/08/02/16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.2 allows remote authenticated users to inject arbitrary web script or HTML via an HTML document with a .gif filename extension, related to inline attachments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-09-07T16:30:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20100803 Re: CVE request: Attachment XSS in mantis \u003c 1.2.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/08/03/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=11952" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/blog/?p=113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620992" }, { "name": "[oss-security] 20100803 CVE request: Attachment XSS in mantis \u003c 1.2.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/08/02/16" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2802", "datePublished": "2010-09-07T16:30:00Z", "dateReserved": "2010-07-22T00:00:00Z", "dateUpdated": "2024-08-07T02:46:48.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9270
Vulnerability from cvelistv5
Published
2014-12-08 16:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/71372 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99037 | vdb-entry, x_refsource_XF | |
https://www.mantisbt.org/bugs/view.php?id=17583 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/867 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q4/902 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/0bff06ec | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "71372", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71372" }, { "name": "mantisbt-projaxapi-xss(99037)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99037" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17583" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/0bff06ec" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the \"profile/Platform\" field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "71372", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71372" }, { "name": "mantisbt-projaxapi-xss(99037)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99037" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17583" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/0bff06ec" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the \"profile/Platform\" field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "71372", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71372" }, { "name": "mantisbt-projaxapi-xss(99037)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99037" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17583", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17583" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "https://github.com/mantisbt/mantisbt/commit/0bff06ec", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/0bff06ec" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9270", "datePublished": "2014-12-08T16:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15074
Vulnerability from cvelistv5
Published
2019-08-21 18:23
Modified
2024-08-05 00:34
Severity ?
EPSS score ?
Summary
The Timeline feature in my_view_page.php in MantisBT through 2.21.1 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed for any user having visibility to the issue, whenever My View Page is displayed.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=25995 | x_refsource_MISC | |
https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=25995" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Timeline feature in my_view_page.php in MantisBT through 2.21.1 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed for any user having visibility to the issue, whenever My View Page is displayed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-21T18:23:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=25995" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Timeline feature in my_view_page.php in MantisBT through 2.21.1 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed for any user having visibility to the issue, whenever My View Page is displayed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=25995", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=25995" }, { "name": "https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/9cee1971c498bbe0a72bca1c773fae50171d8c27" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15074", "datePublished": "2019-08-21T18:23:04", "dateReserved": "2019-08-15T00:00:00", "dateUpdated": "2024-08-05T00:34:53.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15715
Vulnerability from cvelistv5
Published
2019-10-09 19:20
Modified
2024-08-05 00:56
Severity ?
EPSS score ?
Summary
MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/changelog_page.php?project=mantisbt | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=26091 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501 | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=26162 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5 | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/changelog_page.php?project=mantisbt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=26091" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=26162" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-18T18:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/changelog_page.php?project=mantisbt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=26091" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=26162" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/changelog_page.php?project=mantisbt", "refsource": "MISC", "url": "https://mantisbt.org/bugs/changelog_page.php?project=mantisbt" }, { "name": "https://mantisbt.org/bugs/view.php?id=26091", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=26091" }, { "name": "https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c" }, { "name": "https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501" }, { "name": "https://mantisbt.org/bugs/view.php?id=26162", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=26162" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52" }, { "name": "https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5" }, { "name": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15715", "datePublished": "2019-10-09T19:20:28", "dateReserved": "2019-08-28T00:00:00", "dateUpdated": "2024-08-05T00:56:22.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45792
Vulnerability from cvelistv5
Published
2024-09-30 14:40
Modified
2024-09-30 15:31
Severity ?
EPSS score ?
Summary
Mantis Bug Tracker (MantisBT) is an open source issue tracker. Using a crafted POST request, an unprivileged, registered user is able to retrieve information about other users' personal system profiles. This vulnerability is fixed in 2.26.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-h5q3-fjp4-2x7r | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/ef0f820284032350cc20a39ff9cb2010d5463b41 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=34640 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45792", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T15:31:35.315473Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T15:31:48.273Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.26.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Mantis Bug Tracker (MantisBT) is an open source issue tracker. Using a crafted POST request, an unprivileged, registered user is able to retrieve information about other users\u0027 personal system profiles. This vulnerability is fixed in 2.26.4." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-30T14:40:25.616Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-h5q3-fjp4-2x7r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-h5q3-fjp4-2x7r" }, { "name": "https://github.com/mantisbt/mantisbt/commit/ef0f820284032350cc20a39ff9cb2010d5463b41", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/ef0f820284032350cc20a39ff9cb2010d5463b41" }, { "name": "https://mantisbt.org/bugs/view.php?id=34640", "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=34640" } ], "source": { "advisory": "GHSA-h5q3-fjp4-2x7r", "discovery": "UNKNOWN" }, "title": "MantisBT vulnerable to information disclosure with user profiles" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45792", "datePublished": "2024-09-30T14:40:25.616Z", "dateReserved": "2024-09-09T14:23:07.500Z", "dateUpdated": "2024-09-30T15:31:48.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1609
Vulnerability from cvelistv5
Published
2014-03-20 16:00
Modified
2024-08-06 09:50
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/65461 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=1063111 | x_refsource_CONFIRM | |
http://www.ocert.org/advisories/ocert-2014-001.html | x_refsource_MISC | |
http://www.debian.org/security/2014/dsa-3030 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f | x_refsource_CONFIRM | |
http://secunia.com/advisories/61432 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mantisbt.org/bugs/view.php?id=16880 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:50:09.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "65461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65461" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "name": "DSA-3030", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f" }, { "name": "61432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16880" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "65461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65461" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "name": "DSA-3030", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f" }, { "name": "61432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16880" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1609", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "65461", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65461" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "name": "http://www.ocert.org/advisories/ocert-2014-001.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "name": "DSA-3030", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3030" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f" }, { "name": "61432", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61432" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=16880", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=16880" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1609", "datePublished": "2014-03-20T16:00:00", "dateReserved": "2014-01-18T00:00:00", "dateUpdated": "2024-08-06T09:50:09.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9279
Vulnerability from cvelistv5
Published
2014-12-08 16:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/71359 | vdb-entry, x_refsource_BID | |
https://github.com/mantisbt/mantisbt/commit/0826cef8 | x_refsource_CONFIRM | |
http://www.mantisbt.org/bugs/view.php?id=17877 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/863 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99031 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:25.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "71359", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71359" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/0826cef8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17877" }, { "name": "[oss-security] 20141129 CVE Request: DB credentials disclosure in MantisBT\u0027s unattended upgrade script", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/863" }, { "name": "mantisbt-upgradeunattaended-sec-bypass(99031)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "71359", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71359" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/0826cef8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17877" }, { "name": "[oss-security] 20141129 CVE Request: DB credentials disclosure in MantisBT\u0027s unattended upgrade script", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/863" }, { "name": "mantisbt-upgradeunattaended-sec-bypass(99031)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99031" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9279", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "71359", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71359" }, { "name": "https://github.com/mantisbt/mantisbt/commit/0826cef8", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/0826cef8" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17877", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17877" }, { "name": "[oss-security] 20141129 CVE Request: DB credentials disclosure in MantisBT\u0027s unattended upgrade script", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/863" }, { "name": "mantisbt-upgradeunattaended-sec-bypass(99031)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99031" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9279", "datePublished": "2014-12-08T16:00:00", "dateReserved": "2014-12-05T00:00:00", "dateUpdated": "2024-08-06T13:40:25.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1811
Vulnerability from cvelistv5
Published
2019-11-07 22:28
Modified
2024-08-06 15:13
Severity ?
EPSS score ?
Summary
An access control issue in MantisBT before 1.2.13 allows users with "Reporter" permissions to change any issue to "New".
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1811 | x_refsource_MISC | |
http://www.debian.org/security/2015/dsa-3120 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/03/03/6 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/03/04/9 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=15258 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1811" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/03/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/04/9" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=15258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantis", "vendor": "mantis", "versions": [ { "status": "affected", "version": "1.2.13" } ] } ], "datePublic": "2012-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An access control issue in MantisBT before 1.2.13 allows users with \"Reporter\" permissions to change any issue to \"New\"." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T22:28:06", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1811" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/03/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/04/9" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=15258" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mantis", "version": { "version_data": [ { "version_value": "1.2.13" } ] } } ] }, "vendor_name": "mantis" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An access control issue in MantisBT before 1.2.13 allows users with \"Reporter\" permissions to change any issue to \"New\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2013-1811", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2013-1811" }, { "name": "http://www.debian.org/security/2015/dsa-3120", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "http://www.openwall.com/lists/oss-security/2013/03/03/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2013/03/03/6" }, { "name": "http://www.openwall.com/lists/oss-security/2013/03/04/9", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2013/03/04/9" }, { "name": "https://mantisbt.org/bugs/view.php?id=15258", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=15258" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1811", "datePublished": "2019-11-07T22:28:06", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9281
Vulnerability from cvelistv5
Published
2014-12-09 22:52
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=17876 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/913 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/e5fc835a | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/71371 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/867 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q4/924 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99038 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17876" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/913" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/e5fc835a" }, { "name": "71371", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71371" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "mantisbt-copyfield-xss(99038)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99038" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17876" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/913" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/e5fc835a" }, { "name": "71371", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71371" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "mantisbt-copyfield-xss(99038)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99038" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=17876", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17876" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/913" }, { "name": "https://github.com/mantisbt/mantisbt/commit/e5fc835a", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/e5fc835a" }, { "name": "71371", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71371" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141205 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/924" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "mantisbt-copyfield-xss(99038)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99038" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9281", "datePublished": "2014-12-09T22:52:00", "dateReserved": "2014-12-05T00:00:00", "dateUpdated": "2024-08-06T13:40:24.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1122
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:45
Severity ?
EPSS score ?
Summary
bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privileges for a project to bypass intended access restrictions and move bug reports to a different project.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.404Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13748" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privileges for a project to bypass intended access restrictions and move bug reports to a different project." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13748" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48258" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1122", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.404Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35849
Vulnerability from cvelistv5
Published
2020-12-30 18:04
Modified
2024-08-04 17:16
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27370 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:16:12.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27370" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-30T18:04:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27370" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35849", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27370", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27370" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35849", "datePublished": "2020-12-30T18:04:07", "dateReserved": "2020-12-30T00:00:00", "dateUpdated": "2024-08-04T17:16:12.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29605
Vulnerability from cvelistv5
Published
2021-01-29 06:43
Modified
2024-08-04 16:55
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27357 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=27727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-29T06:43:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27357", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27357" }, { "name": "https://mantisbt.org/bugs/view.php?id=27727", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27727" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29605", "datePublished": "2021-01-29T06:43:17", "dateReserved": "2020-12-07T00:00:00", "dateUpdated": "2024-08-04T16:55:10.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8988
Vulnerability from cvelistv5
Published
2014-11-24 15:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.18 allows remote authenticated users to bypass the $g_download_attachments_threshold and $g_view_attachments_threshold restrictions and read attachments for private projects by leveraging access to a project that does not restrict access to attachments and a request to the download URL.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/11/15/6 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/5f0b150b | x_refsource_CONFIRM | |
http://www.mantisbt.org/bugs/view.php?id=17742 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/71104 | vdb-entry, x_refsource_BID | |
http://seclists.org/oss-sec/2014/q4/693 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98731 | vdb-entry, x_refsource_XF | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:12.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20141115 CVE Request: information disclosure in MantisBT attachments", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/5f0b150b" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17742" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "71104", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71104" }, { "name": "[oss-security] 20141119 Re: CVE Request: information disclosure in MantisBT attachments", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/693" }, { "name": "mantisbt-fileapi-sec-bypass(98731)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98731" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.18 allows remote authenticated users to bypass the $g_download_attachments_threshold and $g_view_attachments_threshold restrictions and read attachments for private projects by leveraging access to a project that does not restrict access to attachments and a request to the download URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20141115 CVE Request: information disclosure in MantisBT attachments", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/5f0b150b" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17742" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "71104", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71104" }, { "name": "[oss-security] 20141119 Re: CVE Request: information disclosure in MantisBT attachments", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/693" }, { "name": "mantisbt-fileapi-sec-bypass(98731)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98731" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.2.18 allows remote authenticated users to bypass the $g_download_attachments_threshold and $g_view_attachments_threshold restrictions and read attachments for private projects by leveraging access to a project that does not restrict access to attachments and a request to the download URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141115 CVE Request: information disclosure in MantisBT attachments", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/6" }, { "name": "https://github.com/mantisbt/mantisbt/commit/5f0b150b", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/5f0b150b" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17742", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17742" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "71104", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71104" }, { "name": "[oss-security] 20141119 Re: CVE Request: information disclosure in MantisBT attachments", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/693" }, { "name": "mantisbt-fileapi-sec-bypass(98731)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98731" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8988", "datePublished": "2014-11-24T15:00:00", "dateReserved": "2014-11-19T00:00:00", "dateUpdated": "2024-08-06T13:33:12.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7615
Vulnerability from cvelistv5
Published
2017-04-16 14:45
Modified
2024-08-05 16:12
Severity ?
EPSS score ?
Summary
MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/97707 | vdb-entry, x_refsource_BID | |
https://mantisbt.org/bugs/view.php?id=22690 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2017/04/16/2 | x_refsource_MISC | |
https://www.exploit-db.com/exploits/41890/ | exploit, x_refsource_EXPLOIT-DB | |
http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt | x_refsource_MISC | |
http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:26.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97707", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97707" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=22690" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/2" }, { "name": "41890", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41890/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-18T18:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "97707", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97707" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=22690" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2017/04/16/2" }, { "name": "41890", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41890/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7615", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "97707", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97707" }, { "name": "https://mantisbt.org/bugs/view.php?id=22690", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=22690" }, { "name": "http://www.openwall.com/lists/oss-security/2017/04/16/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2017/04/16/2" }, { "name": "41890", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41890/" }, { "name": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt", "refsource": "MISC", "url": "http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt" }, { "name": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7615", "datePublished": "2017-04-16T14:45:00", "dateReserved": "2017-04-09T00:00:00", "dateUpdated": "2024-08-05T16:12:26.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43257
Vulnerability from cvelistv5
Published
2022-04-14 19:25
Modified
2024-08-04 03:55
Severity ?
EPSS score ?
Summary
Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel.
References
▼ | URL | Tags |
---|---|---|
https://www.mantisbt.org/bugs/view.php?id=29130 | x_refsource_MISC | |
https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:55:28.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=29130" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-14T19:25:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mantisbt.org/bugs/view.php?id=29130" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mantisbt.org/bugs/view.php?id=29130", "refsource": "MISC", "url": "https://www.mantisbt.org/bugs/view.php?id=29130" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e", "refsource": "MISC", "url": "https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43257", "datePublished": "2022-04-14T19:25:45", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-08-04T03:55:28.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3102
Vulnerability from cvelistv5
Published
2008-09-24 10:00
Modified
2024-08-07 09:28
Severity ?
EPSS score ?
Summary
Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:40.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31344", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31344" }, { "name": "32243", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32243" }, { "name": "FEDORA-2008-9015", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00648.html" }, { "name": "4298", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4298" }, { "name": "20080923 mantis CVE-2008-3102 (Re: menalto gallery: Session hijacking vulnerability, CVE-2008-3102)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496684/100/0/threaded" }, { "name": "32975", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32975" }, { "name": "GLSA-200812-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml" }, { "name": "32330", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32330" }, { "name": "mantis-cookie-session-hijacking(45395)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45395" }, { "name": "FEDORA-2008-8925", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00504.html" }, { "name": "20080922 menalto gallery: Session hijacking vulnerability, CVE-2008-3102", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496625/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://int21.de/cve/CVE-2008-3102-mantis.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31344", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31344" }, { "name": "32243", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32243" }, { "name": "FEDORA-2008-9015", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00648.html" }, { "name": "4298", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4298" }, { "name": "20080923 mantis CVE-2008-3102 (Re: menalto gallery: Session hijacking vulnerability, CVE-2008-3102)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496684/100/0/threaded" }, { "name": "32975", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32975" }, { "name": "GLSA-200812-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml" }, { "name": "32330", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32330" }, { "name": "mantis-cookie-session-hijacking(45395)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45395" }, { "name": "FEDORA-2008-8925", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00504.html" }, { "name": "20080922 menalto gallery: Session hijacking vulnerability, CVE-2008-3102", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496625/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://int21.de/cve/CVE-2008-3102-mantis.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31344", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31344" }, { "name": "32243", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32243" }, { "name": "FEDORA-2008-9015", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00648.html" }, { "name": "4298", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4298" }, { "name": "20080923 mantis CVE-2008-3102 (Re: menalto gallery: Session hijacking vulnerability, CVE-2008-3102)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496684/100/0/threaded" }, { "name": "32975", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32975" }, { "name": "GLSA-200812-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml" }, { "name": "32330", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32330" }, { "name": "mantis-cookie-session-hijacking(45395)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45395" }, { "name": "FEDORA-2008-8925", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00504.html" }, { "name": "20080922 menalto gallery: Session hijacking vulnerability, CVE-2008-3102", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496625/100/0/threaded" }, { "name": "http://int21.de/cve/CVE-2008-3102-mantis.html", "refsource": "MISC", "url": "http://int21.de/cve/CVE-2008-3102-mantis.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3102", "datePublished": "2008-09-24T10:00:00", "dateReserved": "2008-07-09T00:00:00", "dateUpdated": "2024-08-07T09:28:40.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1119
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 18:45
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.9 does not audit when users copy or clone a bug report, which makes it easier for remote attackers to copy bug reports without detection.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.369Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13816" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48258" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/dea7e315f3fc96dfa995e56e8810845fc07a47aa" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/cf5df427f17cf9204645f83e000665780eb9afe6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.9 does not audit when users copy or clone a bug report, which makes it easier for remote attackers to copy bug reports without detection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52313" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "DSA-2500", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2500" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13816" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140" }, { "name": "49572", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49572" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120306 Re: CVE request: mantisbt before 1.2.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "48258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48258" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/dea7e315f3fc96dfa995e56e8810845fc07a47aa" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/cf5df427f17cf9204645f83e000665780eb9afe6" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1119", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:45:27.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5364
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:00
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=20956 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2016/06/11/5 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:00:59.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=20956" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5" }, { "name": "[oss-security] 20160611 Re: MantisBT: XSS in custom fields management", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/11/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=20956" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5" }, { "name": "[oss-security] 20160611 Re: MantisBT: XSS in custom fields management", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/11/5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5364", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in manage_custom_field_edit_page.php in MantisBT 1.2.19 and earlier allows remote attackers to inject arbitrary web script or HTML via the return parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/5068df2dcf79c34741c746c9b27e0083f2a374da" }, { "name": "https://mantisbt.org/bugs/view.php?id=20956", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=20956" }, { "name": "https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/11ab3d6c82a1d3a89b1024f77349fb60a83743c5" }, { "name": "[oss-security] 20160611 Re: MantisBT: XSS in custom fields management", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/11/5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-5364", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-06-09T00:00:00", "dateUpdated": "2024-08-06T01:00:59.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4349
Vulnerability from cvelistv5
Published
2011-01-03 19:26
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "name": "[oss-security] 20101216 Re: CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "name": "mantisbt-dbtype-path-disclosure(64463)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "name": "[oss-security] 20101215 CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php" }, { "name": "[oss-security] 20101216 Re: CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "name": "mantisbt-dbtype-path-disclosure(64463)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64463" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "name": "[oss-security] 20101215 CVE request: MantisBT \u003c=1.2.3 (db_type) Cross-Site Scripting \u0026 Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/4" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4349", "datePublished": "2011-01-03T19:26:00", "dateReserved": "2010-11-30T00:00:00", "dateUpdated": "2024-08-07T03:43:14.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-14504
Vulnerability from cvelistv5
Published
2018-08-03 18:00
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
An issue was discovered in manage_filter_edit_page.php in MantisBT 2.x through 2.15.0. A cross-site scripting (XSS) vulnerability in the Edit Filter page allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name (e.g., 'foobar" onclick="alert(1)').
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=24608 | x_refsource_CONFIRM | |
https://mantisbt.org/blog/archives/mantisbt/602 | x_refsource_CONFIRM | |
http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:51.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=24608" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in manage_filter_edit_page.php in MantisBT 2.x through 2.15.0. A cross-site scripting (XSS) vulnerability in the Edit Filter page allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name (e.g., \u0027foobar\" onclick=\"alert(1)\u0027)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-03T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=24608" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-14504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in manage_filter_edit_page.php in MantisBT 2.x through 2.15.0. A cross-site scripting (XSS) vulnerability in the Edit Filter page allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name (e.g., \u0027foobar\" onclick=\"alert(1)\u0027)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=24608", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=24608" }, { "name": "https://mantisbt.org/blog/archives/mantisbt/602", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/602" }, { "name": "http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f", "refsource": "CONFIRM", "url": "http://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-14504", "datePublished": "2018-08-03T18:00:00", "dateReserved": "2018-07-22T00:00:00", "dateUpdated": "2024-08-05T09:29:51.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3358
Vulnerability from cvelistv5
Published
2011-09-21 16:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8392" }, { "name": "DSA-2308", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "mantisbt-bugreportpage-xss(69589)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69589" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "45961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45961" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49448" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "8392", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8392" }, { "name": "DSA-2308", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "mantisbt-bugreportpage-xss(69589)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69589" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "45961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45961" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49448" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3358", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8392", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8392" }, { "name": "DSA-2308", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2308" }, { "name": "[oss-security] 20110904 CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/04/1" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "mantisbt-bugreportpage-xss(69589)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69589" }, { "name": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html", "refsource": "MISC", "url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html" }, { "name": "45961", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45961" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=735514", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514" }, { "name": "49448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49448" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110909 Re: CVE requests: \u003cmantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/09/09/9" }, { "name": "[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8", "refsource": "MLIST", "url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html" }, { "name": "FEDORA-2011-12369", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d" }, { "name": "20110905 Multiple vulnerabilities in MantisBT", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3358", "datePublished": "2011-09-21T16:00:00", "dateReserved": "2011-08-30T00:00:00", "dateUpdated": "2024-08-06T23:29:56.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7111
Vulnerability from cvelistv5
Published
2017-02-17 17:00
Modified
2024-08-06 01:50
Severity ?
EPSS score ?
Summary
MantisBT before 1.3.1 and 2.x before 2.0.0-beta.2 uses a weak Content Security Policy when using the Gravatar plugin, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/08/28/1 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2016/08/29/2 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/b3511d2f | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=21263 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20160827 MantisBT weakened CSP when using bundled Gravatar plugin", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/28/1" }, { "name": "[oss-security] 20160829 Re: MantisBT weakened CSP when using bundled Gravatar plugin", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/29/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/b3511d2f" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=21263" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.3.1 and 2.x before 2.0.0-beta.2 uses a weak Content Security Policy when using the Gravatar plugin, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-17T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20160827 MantisBT weakened CSP when using bundled Gravatar plugin", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/28/1" }, { "name": "[oss-security] 20160829 Re: MantisBT weakened CSP when using bundled Gravatar plugin", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/08/29/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/b3511d2f" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=21263" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT before 1.3.1 and 2.x before 2.0.0-beta.2 uses a weak Content Security Policy when using the Gravatar plugin, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160827 MantisBT weakened CSP when using bundled Gravatar plugin", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/28/1" }, { "name": "[oss-security] 20160829 Re: MantisBT weakened CSP when using bundled Gravatar plugin", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/08/29/2" }, { "name": "https://github.com/mantisbt/mantisbt/commit/b3511d2f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/b3511d2f" }, { "name": "https://mantisbt.org/bugs/view.php?id=21263", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=21263" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7111", "datePublished": "2017-02-17T17:00:00", "dateReserved": "2016-08-29T00:00:00", "dateUpdated": "2024-08-06T01:50:47.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2691
Vulnerability from cvelistv5
Published
2012-06-17 01:00
Modified
2024-08-06 19:42
Severity ?
EPSS score ?
Summary
The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:32.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14340" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "56467", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56467" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/175d973105fe9f03a37ced537b742611631067e0" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/edc8142bb8ac0ac0df1a3824d78c15f4015d959e" }, { "name": "49414", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49414" }, { "name": "[oss-security] 20120611 Re: CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "53907", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53907" }, { "name": "[oss-security] 20120609 CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "mantisbt-soapapi-sec-bypass(76180)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76180" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14340" }, { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "56467", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56467" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/175d973105fe9f03a37ced537b742611631067e0" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/edc8142bb8ac0ac0df1a3824d78c15f4015d959e" }, { "name": "49414", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49414" }, { "name": "[oss-security] 20120611 Re: CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "53907", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53907" }, { "name": "[oss-security] 20120609 CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "name": "mantisbt-soapapi-sec-bypass(76180)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76180" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2691", "datePublished": "2012-06-17T01:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:32.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0197
Vulnerability from cvelistv5
Published
2014-05-15 14:00
Modified
2024-08-06 14:18
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the filter_draw_selection_area2 function in core/filter_api.php in MantisBT 1.2.12 before 1.2.13 allows remote attackers to inject arbitrary web script or HTML via the match_type parameter to bugs/search.php.
References
▼ | URL | Tags |
---|---|---|
http://www.mantisbt.org/bugs/view.php?id=15373 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2013/q1/125 | mailing-list, x_refsource_MLIST | |
http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html | x_refsource_MISC | |
http://seclists.org/oss-sec/2013/q1/140 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/51853 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2013/q1/118 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15373" }, { "name": "[oss-security] 20130118 Re: CVE request: MantisBT before 1.2.13 match_type XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q1/125" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html" }, { "name": "[oss-security] 20130121 Re: CVE request: MantisBT before 1.2.13 match_type XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q1/140" }, { "name": "51853", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51853" }, { "name": "[oss-security] 20130118 CVE request: MantisBT before 1.2.13 match_type XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q1/118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the filter_draw_selection_area2 function in core/filter_api.php in MantisBT 1.2.12 before 1.2.13 allows remote attackers to inject arbitrary web script or HTML via the match_type parameter to bugs/search.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-15T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=15373" }, { "name": "[oss-security] 20130118 Re: CVE request: MantisBT before 1.2.13 match_type XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q1/125" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html" }, { "name": "[oss-security] 20130121 Re: CVE request: MantisBT before 1.2.13 match_type XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q1/140" }, { "name": "51853", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51853" }, { "name": "[oss-security] 20130118 CVE request: MantisBT before 1.2.13 match_type XSS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q1/118" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0197", "datePublished": "2014-05-15T14:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8986
Vulnerability from cvelistv5
Published
2014-11-24 15:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the selection list in the filters in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via a crafted config option, a different vulnerability than CVE-2014-8987.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/11/15/2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/11/19/20 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/11/15/3 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2014/11/15/1 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40 | x_refsource_CONFIRM | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:12.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "name": "[oss-security] 20141119 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/19/20" }, { "name": "[oss-security] 20141115 Re: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the selection list in the filters in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via a crafted config option, a different vulnerability than CVE-2014-8987." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "name": "[oss-security] 20141119 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/19/20" }, { "name": "[oss-security] 20141115 Re: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/15/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the selection list in the filters in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via a crafted config option, a different vulnerability than CVE-2014-8987." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2" }, { "name": "[oss-security] 20141119 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/19/20" }, { "name": "[oss-security] 20141115 Re: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141115 RE: CVE Request: XSS vulnerability in MantisBT 1.2.13", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/15/1" }, { "name": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8986", "datePublished": "2014-11-24T15:00:00", "dateReserved": "2014-11-19T00:00:00", "dateUpdated": "2024-08-06T13:33:12.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1608
Vulnerability from cvelistv5
Published
2014-03-18 14:00
Modified
2024-08-06 09:50
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1063111 | x_refsource_CONFIRM | |
http://osvdb.org/103118 | vdb-entry, x_refsource_OSVDB | |
http://www.ocert.org/advisories/ocert-2014-001.html | x_refsource_MISC | |
http://www.debian.org/security/2014/dsa-3030 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/65445 | vdb-entry, x_refsource_BID | |
https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102 | x_refsource_CONFIRM | |
http://www.mantisbt.org/bugs/view.php?id=16879 | x_refsource_CONFIRM | |
http://secunia.com/advisories/61432 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:50:09.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "name": "103118", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/103118" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "name": "DSA-3030", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3030" }, { "name": "65445", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16879" }, { "name": "61432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61432" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "name": "103118", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/103118" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "name": "DSA-3030", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3030" }, { "name": "65445", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=16879" }, { "name": "61432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61432" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1608", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1063111" }, { "name": "103118", "refsource": "OSVDB", "url": "http://osvdb.org/103118" }, { "name": "http://www.ocert.org/advisories/ocert-2014-001.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2014-001.html" }, { "name": "DSA-3030", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3030" }, { "name": "65445", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65445" }, { "name": "https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=16879", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=16879" }, { "name": "61432", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61432" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1608", "datePublished": "2014-03-18T14:00:00", "dateReserved": "2014-01-18T00:00:00", "dateUpdated": "2024-08-06T09:50:09.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6799
Vulnerability from cvelistv5
Published
2017-03-10 10:29
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in view_filters_page.php in MantisBT before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the 'view_type' parameter.
References
▼ | URL | Tags |
---|---|---|
http://mantisbt.org/bugs/view.php?id=22497 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2017/03/10/1 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96819 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mantisbt.org/bugs/view.php?id=22497" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "name": "96819", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96819" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in view_filters_page.php in MantisBT before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the \u0027view_type\u0027 parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-14T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mantisbt.org/bugs/view.php?id=22497" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "name": "96819", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96819" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-6799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in view_filters_page.php in MantisBT before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the \u0027view_type\u0027 parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://mantisbt.org/bugs/view.php?id=22497", "refsource": "CONFIRM", "url": "http://mantisbt.org/bugs/view.php?id=22497" }, { "name": "https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/1677251434b6e8b2be8f1d4376a3e78f7be14d95" }, { "name": "http://www.openwall.com/lists/oss-security/2017/03/10/1", "refsource": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2017/03/10/1" }, { "name": "96819", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96819" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-6799", "datePublished": "2017-03-10T10:29:00", "dateReserved": "2017-03-10T00:00:00", "dateUpdated": "2024-08-05T15:41:17.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25781
Vulnerability from cvelistv5
Published
2020-09-30 20:31
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27039 | x_refsource_MISC | |
http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93 | x_refsource_MISC | |
http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27039" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-30T20:31:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27039" }, { "tags": [ "x_refsource_MISC" ], "url": "http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93" }, { "tags": [ "x_refsource_MISC" ], "url": "http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25781", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27039", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27039" }, { "name": "http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93", "refsource": "MISC", "url": "http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93" }, { "name": "http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe", "refsource": "MISC", "url": "http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25781", "datePublished": "2020-09-30T20:31:13", "dateReserved": "2020-09-19T00:00:00", "dateUpdated": "2024-08-04T15:40:36.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17782
Vulnerability from cvelistv5
Published
2018-10-30 18:00
Modified
2024-08-05 10:54
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the Manage Filters page (manage_filter_page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/blog/archives/mantisbt/613 | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=24813 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:54:10.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=24813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Manage Filters page (manage_filter_page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-30T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=24813" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the Manage Filters page (manage_filter_page.php) in MantisBT 2.1.0 through 2.17.1 allows remote attackers (if access rights permit it) to inject arbitrary code (if CSP settings permit it) through a crafted project name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/blog/archives/mantisbt/613", "refsource": "CONFIRM", "url": "https://mantisbt.org/blog/archives/mantisbt/613" }, { "name": "https://mantisbt.org/bugs/view.php?id=24813", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=24813" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17782", "datePublished": "2018-10-30T18:00:00", "dateReserved": "2018-09-29T00:00:00", "dateUpdated": "2024-08-05T10:54:10.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34077
Vulnerability from cvelistv5
Published
2024-05-13 15:30
Modified
2024-08-02 02:42
Severity ?
EPSS score ?
Summary
MantisBT (Mantis Bug Tracker) is an open source issue tracker. Insufficient access control in the registration and password reset process allows an attacker to reset another user's password and takeover their account, if the victim has an incomplete request pending. The exploit is only possible while the verification token is valid, i.e for 5 minutes after the confirmation URL sent by e-mail has been opened, and the user did not complete the process by updating their password. A brute-force attack calling account_update.php with increasing user IDs is possible. A successful takeover would grant the attacker full access to the compromised account, including sensitive information and functionalities associated with the account, the extent of which depends on its privileges and the data it has access to. Version 2.26.2 contains a patch for the issue. As a workaround, one may mitigate the risk by reducing the verification token's validity (change the value of the `TOKEN_EXPIRY_AUTHENTICATED` constant in `constants_inc.php`).
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-93x3-m7pw-ppqm | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/92d11a01b195a1b6717a2f205218089158ea6d00 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=34433 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:mantisbt:mantisbt:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "-" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34077", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-13T19:51:24.911983Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:42:02.555Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-93x3-m7pw-ppqm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-93x3-m7pw-ppqm" }, { "name": "https://github.com/mantisbt/mantisbt/commit/92d11a01b195a1b6717a2f205218089158ea6d00", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/92d11a01b195a1b6717a2f205218089158ea6d00" }, { "name": "https://mantisbt.org/bugs/view.php?id=34433", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=34433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.26.2" } ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT (Mantis Bug Tracker) is an open source issue tracker. Insufficient access control in the registration and password reset process allows an attacker to reset another user\u0027s password and takeover their account, if the victim has an incomplete request pending. The exploit is only possible while the verification token is valid, i.e for 5 minutes after the confirmation URL sent by e-mail has been opened, and the user did not complete the process by updating their password. A brute-force attack calling account_update.php with increasing user IDs is possible. A successful takeover would grant the attacker full access to the compromised account, including sensitive information and functionalities associated with the account, the extent of which depends on its privileges and the data it has access to. Version 2.26.2 contains a patch for the issue. As a workaround, one may mitigate the risk by reducing the verification token\u0027s validity (change the value of the `TOKEN_EXPIRY_AUTHENTICATED` constant in `constants_inc.php`)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305: Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-620", "description": "CWE-620: Unverified Password Change", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-13T15:30:32.334Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-93x3-m7pw-ppqm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-93x3-m7pw-ppqm" }, { "name": "https://github.com/mantisbt/mantisbt/commit/92d11a01b195a1b6717a2f205218089158ea6d00", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/92d11a01b195a1b6717a2f205218089158ea6d00" }, { "name": "https://mantisbt.org/bugs/view.php?id=34433", "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=34433" } ], "source": { "advisory": "GHSA-93x3-m7pw-ppqm", "discovery": "UNKNOWN" }, "title": "MantisBT user account takeover in the signup/reset password process" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34077", "datePublished": "2024-05-13T15:30:32.334Z", "dateReserved": "2024-04-30T06:56:33.383Z", "dateUpdated": "2024-08-02T02:42:59.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6837
Vulnerability from cvelistv5
Published
2017-01-10 15:00
Modified
2024-08-06 01:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MantisBT Filter API in MantisBT versions before 1.2.19, and versions 2.0.0-beta1, 1.3.0-beta1 allows remote attackers to inject arbitrary web script or HTML via the 'view_type' parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e | x_refsource_CONFIRM | |
https://mantisbt.org/bugs/view.php?id=21611 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1036655 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/92522 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=21611" }, { "name": "1036655", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036655" }, { "name": "92522", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92522" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MantisBT Filter API in MantisBT versions before 1.2.19, and versions 2.0.0-beta1, 1.3.0-beta1 allows remote attackers to inject arbitrary web script or HTML via the \u0027view_type\u0027 parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-10T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=21611" }, { "name": "1036655", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036655" }, { "name": "92522", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92522" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MantisBT Filter API in MantisBT versions before 1.2.19, and versions 2.0.0-beta1, 1.3.0-beta1 allows remote attackers to inject arbitrary web script or HTML via the \u0027view_type\u0027 parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/7086c2d8b4b20ac14013b36761ac04f0abf21a4e" }, { "name": "https://mantisbt.org/bugs/view.php?id=21611", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=21611" }, { "name": "1036655", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036655" }, { "name": "92522", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92522" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6837", "datePublished": "2017-01-10T15:00:00", "dateReserved": "2016-08-17T00:00:00", "dateUpdated": "2024-08-06T01:43:38.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1932
Vulnerability from cvelistv5
Published
2019-10-31 19:05
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via a project name.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1932 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1932 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/04/06/4 | x_refsource_MISC | |
http://www.securityfocus.com/bid/58893 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=15415 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58893" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=15415" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisBT", "vendor": "mantisBT", "versions": [ { "status": "affected", "version": "1.2.13" } ] } ], "datePublic": "2019-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via a project name." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T19:05:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1932" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1932" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/06/4" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/58893" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=15415" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1932", "datePublished": "2019-10-31T19:05:12", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8598
Vulnerability from cvelistv5
Published
2014-11-18 15:00
Modified
2024-08-06 13:25
Severity ?
EPSS score ?
Summary
The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/commit/80a15487 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/11/07/28 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98573 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/70996 | vdb-entry, x_refsource_BID | |
http://www.mantisbt.org/bugs/view.php?id=17780 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:25:59.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/80a15487" }, { "name": "[oss-security] 20141108 CVE-2014-8598: MantisBT XML Import/Export plugin unrestricted access", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/07/28" }, { "name": "mantisbt-cve20148598-sec-bypass(98573)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98573" }, { "name": "70996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17780" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/80a15487" }, { "name": "[oss-security] 20141108 CVE-2014-8598: MantisBT XML Import/Export plugin unrestricted access", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/07/28" }, { "name": "mantisbt-cve20148598-sec-bypass(98573)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98573" }, { "name": "70996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17780" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8598", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mantisbt/mantisbt/commit/80a15487", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/80a15487" }, { "name": "[oss-security] 20141108 CVE-2014-8598: MantisBT XML Import/Export plugin unrestricted access", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/07/28" }, { "name": "mantisbt-cve20148598-sec-bypass(98573)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98573" }, { "name": "70996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70996" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17780", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17780" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8598", "datePublished": "2014-11-18T15:00:00", "dateReserved": "2014-11-04T00:00:00", "dateUpdated": "2024-08-06T13:25:59.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7897
Vulnerability from cvelistv5
Published
2017-04-18 17:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER['PHP_SELF'] to generate URLs.
References
▼ | URL | Tags |
---|---|---|
http://www.mantisbt.org/bugs/view.php?id=22742 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038278 | vdb-entry, x_refsource_SECTRACK | |
https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/pull/1094 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22742" }, { "name": "1038278", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038278" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/pull/1094" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER[\u0027PHP_SELF\u0027] to generate URLs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=22742" }, { "name": "1038278", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038278" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/pull/1094" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER[\u0027PHP_SELF\u0027] to generate URLs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mantisbt.org/bugs/view.php?id=22742", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=22742" }, { "name": "1038278", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038278" }, { "name": "https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1" }, { "name": "https://github.com/mantisbt/mantisbt/pull/1094", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/pull/1094" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7897", "datePublished": "2017-04-18T17:00:00", "dateReserved": "2017-04-18T00:00:00", "dateUpdated": "2024-08-05T16:19:29.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-20001
Vulnerability from cvelistv5
Published
2021-03-07 19:02
Modified
2024-08-07 07:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27976 | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=11296 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:23.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27976" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=11296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user\u0027s cookie to login as them." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-07T19:02:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27976" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=11296" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-20001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user\u0027s cookie to login as them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27976", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27976" }, { "name": "https://mantisbt.org/bugs/view.php?id=11296", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=11296" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-20001", "datePublished": "2021-03-07T19:02:20", "dateReserved": "2021-03-07T00:00:00", "dateUpdated": "2024-08-07T07:32:23.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5059
Vulnerability from cvelistv5
Published
2017-08-01 14:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
The "Project Documentation" feature in MantisBT 1.2.19 and earlier, when the threshold to access files ($g_view_proj_doc_threshold) is set to ANYBODY, allows remote authenticated users to download attachments linked to arbitrary private projects via a file id number in the file_id parameter to file_download.php.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/06/25/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/06/25/4 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/75414 | vdb-entry, x_refsource_BID | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163191.html | vendor-advisory, x_refsource_FEDORA | |
https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1237199 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.708Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150624 Re: CVE Request: Information disclosure in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/3" }, { "name": "[oss-security] 20150625 Re: CVE Request: Information disclosure in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/4" }, { "name": "75414", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75414" }, { "name": "FEDORA-2015-12010", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163191.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The \"Project Documentation\" feature in MantisBT 1.2.19 and earlier, when the threshold to access files ($g_view_proj_doc_threshold) is set to ANYBODY, allows remote authenticated users to download attachments linked to arbitrary private projects via a file id number in the file_id parameter to file_download.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-01T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20150624 Re: CVE Request: Information disclosure in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/3" }, { "name": "[oss-security] 20150625 Re: CVE Request: Information disclosure in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/25/4" }, { "name": "75414", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75414" }, { "name": "FEDORA-2015-12010", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163191.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The \"Project Documentation\" feature in MantisBT 1.2.19 and earlier, when the threshold to access files ($g_view_proj_doc_threshold) is set to ANYBODY, allows remote authenticated users to download attachments linked to arbitrary private projects via a file id number in the file_id parameter to file_download.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150624 Re: CVE Request: Information disclosure in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/06/25/3" }, { "name": "[oss-security] 20150625 Re: CVE Request: Information disclosure in MantisBT", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/06/25/4" }, { "name": "75414", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75414" }, { "name": "FEDORA-2015-12010", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163191.html" }, { "name": "https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/f39cf5251953b468e9d921e1cf2aca3abdb00772" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1237199", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1237199" }, { "name": "https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/a4be76d6e5c4939545d84712c79d3f8f4a108c4f" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5059", "datePublished": "2017-08-01T14:00:00", "dateReserved": "2015-06-24T00:00:00", "dateUpdated": "2024-08-06T06:32:32.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7146
Vulnerability from cvelistv5
Published
2014-11-18 15:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/70993 | vdb-entry, x_refsource_BID | |
http://www.mantisbt.org/bugs/view.php?id=17725 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/bed19db9 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98572 | vdb-entry, x_refsource_XF | |
https://github.com/mantisbt/mantisbt/commit/84017535 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/576 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "70993", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17725" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/bed19db9" }, { "name": "mantisbt-cve20147146-code-exec(98572)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98572" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/84017535" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141108 CVE-2014-7146: MantisBT XmlImportExport plugin PHP Code Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/576" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "70993", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17725" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/bed19db9" }, { "name": "mantisbt-cve20147146-code-exec(98572)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98572" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/84017535" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141108 CVE-2014-7146: MantisBT XmlImportExport plugin PHP Code Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/576" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "70993", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70993" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17725", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17725" }, { "name": "https://github.com/mantisbt/mantisbt/commit/bed19db9", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/bed19db9" }, { "name": "mantisbt-cve20147146-code-exec(98572)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98572" }, { "name": "https://github.com/mantisbt/mantisbt/commit/84017535", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/84017535" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141108 CVE-2014-7146: MantisBT XmlImportExport plugin PHP Code Injection Vulnerability", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/576" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7146", "datePublished": "2014-11-18T15:00:00", "dateReserved": "2014-09-22T00:00:00", "dateUpdated": "2024-08-06T12:40:19.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15539
Vulnerability from cvelistv5
Published
2020-03-19 18:20
Modified
2024-08-05 00:49
Severity ?
EPSS score ?
Summary
The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document's page.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=26078 | x_refsource_MISC | |
https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:49:13.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=26078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document\u0027s page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-19T18:20:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=26078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15539", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document\u0027s page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=26078", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=26078" }, { "name": "https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a96eea" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15539", "datePublished": "2020-03-19T18:20:08", "dateReserved": "2019-08-25T00:00:00", "dateUpdated": "2024-08-05T00:49:13.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9272
Vulnerability from cvelistv5
Published
2015-01-09 18:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
The string_insert_href function in MantisBT 1.2.0a1 through 1.2.x before 1.2.18 does not properly validate the URL protocol, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the javascript:// protocol.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/commit/05378e00 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17297 | x_refsource_CONFIRM | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/867 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2014/q4/902 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/05378e00" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17297" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The string_insert_href function in MantisBT 1.2.0a1 through 1.2.x before 1.2.18 does not properly validate the URL protocol, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the javascript:// protocol." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/05378e00" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17297" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The string_insert_href function in MantisBT 1.2.0a1 through 1.2.x before 1.2.18 does not properly validate the URL protocol, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the javascript:// protocol." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mantisbt/mantisbt/commit/05378e00", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/05378e00" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17297", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17297" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/867" }, { "name": "[oss-security] 20141204 Re: CVE Request: Multiple XSS vulnerabilities in MantisBT", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/902" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9272", "datePublished": "2015-01-09T18:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3303
Vulnerability from cvelistv5
Published
2010-10-05 21:00
Modified
2024-08-07 03:03
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.3 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) a plugin name, related to manage_plugin_uninstall.php; (2) an enumeration value or (3) a String value of a custom field, related to core/cfdefs/cfdef_standard.php; or a (4) project or (5) category name to print_all_bug_page_word.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:03:18.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-15080", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "name": "FEDORA-2010-15082", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "41653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41653" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12234" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12231" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/19" }, { "name": "ADV-2010-2535", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "FEDORA-2010-15061", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "name": "[oss-security] 20100916 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/16/16" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "name": "43604", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43604" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12232" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12238" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.3 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) a plugin name, related to manage_plugin_uninstall.php; (2) an enumeration value or (3) a String value of a custom field, related to core/cfdefs/cfdef_standard.php; or a (4) project or (5) category name to print_all_bug_page_word.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2010-15080", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html" }, { "name": "FEDORA-2010-15082", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "41653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41653" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12234" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12231" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/19" }, { "name": "ADV-2010-2535", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2535" }, { "name": "[oss-security] 20100914 CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/12" }, { "name": "FEDORA-2010-15061", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20100914 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/14/13" }, { "name": "[oss-security] 20100916 Re: CVE request: mantis before 1.2.3 (XSS)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/16/16" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=111" }, { "name": "43604", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43604" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12232" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12238" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3303", "datePublished": "2010-10-05T21:00:00", "dateReserved": "2010-09-13T00:00:00", "dateUpdated": "2024-08-07T03:03:18.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9573
Vulnerability from cvelistv5
Published
2015-01-26 15:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in manage_user_page.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with FILE privileges to execute arbitrary SQL commands via the MANTIS_MANAGE_USERS_COOKIE cookie.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1031633 | vdb-entry, x_refsource_SECTRACK | |
http://seclists.org/oss-sec/2015/q1/157 | mailing-list, x_refsource_MLIST | |
https://github.com/mantisbt/mantisbt/commit/7cc4539f | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100210 | vdb-entry, x_refsource_XF | |
https://www.htbridge.com/advisory/HTB23243 | x_refsource_MISC | |
https://github.com/mantisbt/mantisbt/commit/69c2d28d | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17937 | x_refsource_CONFIRM | |
https://www.mantisbt.org/bugs/view.php?id=17940 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150116 CVE-2014-9573: SQL Injection in manage_user_page.php", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2015/q1/157" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/7cc4539f" }, { "name": "mantisbt-cve20149573-sql-injection(100210)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100210" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/69c2d28d" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17940" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in manage_user_page.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with FILE privileges to execute arbitrary SQL commands via the MANTIS_MANAGE_USERS_COOKIE cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1031633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150116 CVE-2014-9573: SQL Injection in manage_user_page.php", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2015/q1/157" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/7cc4539f" }, { "name": "mantisbt-cve20149573-sql-injection(100210)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100210" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.com/advisory/HTB23243" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/69c2d28d" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mantisbt.org/bugs/view.php?id=17940" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in manage_user_page.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with FILE privileges to execute arbitrary SQL commands via the MANTIS_MANAGE_USERS_COOKIE cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031633" }, { "name": "[oss-security] 20150116 CVE-2014-9573: SQL Injection in manage_user_page.php", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q1/157" }, { "name": "https://github.com/mantisbt/mantisbt/commit/7cc4539f", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/7cc4539f" }, { "name": "mantisbt-cve20149573-sql-injection(100210)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100210" }, { "name": "https://www.htbridge.com/advisory/HTB23243", "refsource": "MISC", "url": "https://www.htbridge.com/advisory/HTB23243" }, { "name": "https://github.com/mantisbt/mantisbt/commit/69c2d28d", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/69c2d28d" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17937", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17937" }, { "name": "https://www.mantisbt.org/bugs/view.php?id=17940", "refsource": "CONFIRM", "url": "https://www.mantisbt.org/bugs/view.php?id=17940" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9573", "datePublished": "2015-01-26T15:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T13:47:41.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34081
Vulnerability from cvelistv5
Published
2024-05-13 15:40
Modified
2024-08-02 02:42
Severity ?
EPSS score ?
Summary
MantisBT (Mantis Bug Tracker) is an open source issue tracker. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when resolving or closing issues (`bug_change_status_page.php`) belonging to a project linking said custom field, viewing issues (`view_all_bug_page.php`) when the custom field is displayed as a column, or printing issues (`print_all_bug_page.php`) when the custom field is displayed as a column. Version 2.26.2 contains a patch for the issue. As a workaround, ensure Custom Field Names do not contain HTML tags.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be | x_refsource_MISC | |
https://mantisbt.org/bugs/view.php?id=34432 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-34081", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T19:02:37.888445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T19:02:46.705Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq" }, { "name": "https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be" }, { "name": "https://mantisbt.org/bugs/view.php?id=34432", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=34432" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mantisbt", "vendor": "mantisbt", "versions": [ { "status": "affected", "version": "\u003c 2.26.2" } ] } ], "descriptions": [ { "lang": "en", "value": "MantisBT (Mantis Bug Tracker) is an open source issue tracker. Improper escaping of a custom field\u0027s name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when resolving or closing issues (`bug_change_status_page.php`) belonging to a project linking said custom field, viewing issues (`view_all_bug_page.php`) when the custom field is displayed as a column, or printing issues (`print_all_bug_page.php`) when the custom field is displayed as a column. Version 2.26.2 contains a patch for the issue. As a workaround, ensure Custom Field Names do not contain HTML tags." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-13T15:40:54.014Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq" }, { "name": "https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be" }, { "name": "https://mantisbt.org/bugs/view.php?id=34432", "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=34432" } ], "source": { "advisory": "GHSA-wgx7-jp56-65mq", "discovery": "UNKNOWN" }, "title": "MantisBT Cross-site Scripting vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34081", "datePublished": "2024-05-13T15:40:54.014Z", "dateReserved": "2024-04-30T06:56:33.384Z", "dateUpdated": "2024-08-02T02:42:59.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3755
Vulnerability from cvelistv5
Published
2011-09-23 23:00
Modified
2024-08-06 23:46
Severity ?
EPSS score ?
Summary
MantisBT 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by view_all_inc.php and certain other files.
References
▼ | URL | Tags |
---|---|---|
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4 | x_refsource_MISC | |
http://security.gentoo.org/glsa/glsa-201211-01.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2011/06/27/6 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/51199 | third-party-advisory, x_refsource_SECUNIA | |
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:46:02.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-27T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by view_all_inc.php and certain other files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_MISC" ], "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3755", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MantisBT 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by view_all_inc.php and certain other files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4", "refsource": "MISC", "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README", "refsource": "MISC", "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3755", "datePublished": "2011-09-23T23:00:00", "dateReserved": "2011-09-23T00:00:00", "dateUpdated": "2024-08-06T23:46:02.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2938
Vulnerability from cvelistv5
Published
2011-09-21 16:00
Modified
2024-08-06 23:15
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49235", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49235" }, { "name": "[oss-security] 20110819 CVE request: MantisBT \u003c1.2.7 search.php multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/18/7" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b" }, { "name": "8391", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=379739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.org/files/104149" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731777" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110819 Re: CVE request: MantisBT \u003c1.2.7 search.php multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/16" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-14T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "49235", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49235" }, { "name": "[oss-security] 20110819 CVE request: MantisBT \u003c1.2.7 search.php multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/18/7" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b" }, { "name": "8391", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=379739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.org/files/104149" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731777" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110819 Re: CVE request: MantisBT \u003c1.2.7 search.php multiple XSS vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/16" }, { "name": "FEDORA-2011-12369", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=13245" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49235", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49235" }, { "name": "[oss-security] 20110819 CVE request: MantisBT \u003c1.2.7 search.php multiple XSS vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/08/18/7" }, { "name": "GLSA-201211-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b" }, { "name": "8391", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8391" }, { "name": "https://bugs.gentoo.org/show_bug.cgi?id=379739", "refsource": "CONFIRM", "url": "https://bugs.gentoo.org/show_bug.cgi?id=379739" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857" }, { "name": "http://packetstormsecurity.org/files/104149", "refsource": "MISC", "url": "http://packetstormsecurity.org/files/104149" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=731777", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731777" }, { "name": "51199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51199" }, { "name": "[oss-security] 20110819 Re: CVE request: MantisBT \u003c1.2.7 search.php multiple XSS vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/08/19/16" }, { "name": "FEDORA-2011-12369", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=13245", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=13245" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2938", "datePublished": "2011-09-21T16:00:00", "dateReserved": "2011-07-27T00:00:00", "dateUpdated": "2024-08-06T23:15:31.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9280
Vulnerability from cvelistv5
Published
2014-12-08 16:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/71361 | vdb-entry, x_refsource_BID | |
http://www.mantisbt.org/bugs/view.php?id=17875 | x_refsource_CONFIRM | |
https://github.com/mantisbt/mantisbt/commit/599364b2 | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/923 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99016 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/62101 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2015/dsa-3120 | vendor-advisory, x_refsource_DEBIAN | |
http://seclists.org/oss-sec/2014/q4/864 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "71361", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17875" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/599364b2" }, { "name": "[oss-security] 20141205 Re: CVE request: PHP Object Injection in MantisBT filter API", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/923" }, { "name": "mantisbt-currentusergetbug-code-exec(99016)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99016" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "[oss-security] 20141129 CVE request: PHP Object Injection in MantisBT filter API", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/864" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "71361", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=17875" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/599364b2" }, { "name": "[oss-security] 20141205 Re: CVE request: PHP Object Injection in MantisBT filter API", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/923" }, { "name": "mantisbt-currentusergetbug-code-exec(99016)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99016" }, { "name": "62101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "[oss-security] 20141129 CVE request: PHP Object Injection in MantisBT filter API", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/864" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "71361", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71361" }, { "name": "http://www.mantisbt.org/bugs/view.php?id=17875", "refsource": "CONFIRM", "url": "http://www.mantisbt.org/bugs/view.php?id=17875" }, { "name": "https://github.com/mantisbt/mantisbt/commit/599364b2", "refsource": "CONFIRM", "url": "https://github.com/mantisbt/mantisbt/commit/599364b2" }, { "name": "[oss-security] 20141205 Re: CVE request: PHP Object Injection in MantisBT filter API", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/923" }, { "name": "mantisbt-currentusergetbug-code-exec(99016)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99016" }, { "name": "62101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62101" }, { "name": "DSA-3120", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3120" }, { "name": "[oss-security] 20141129 CVE request: PHP Object Injection in MantisBT filter API", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/864" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9280", "datePublished": "2014-12-08T16:00:00", "dateReserved": "2014-12-05T00:00:00", "dateUpdated": "2024-08-06T13:40:24.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25288
Vulnerability from cvelistv5
Published
2020-09-30 20:26
Modified
2024-08-04 15:33
Severity ?
EPSS score ?
Summary
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
References
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=27275 | x_refsource_MISC | |
http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:33:05.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=27275" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input\u0027s pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-30T20:26:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mantisbt.org/bugs/view.php?id=27275" }, { "tags": [ "x_refsource_MISC" ], "url": "http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input\u0027s pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=27275", "refsource": "MISC", "url": "https://mantisbt.org/bugs/view.php?id=27275" }, { "name": "http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c", "refsource": "MISC", "url": "http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25288", "datePublished": "2020-09-30T20:26:59", "dateReserved": "2020-09-13T00:00:00", "dateUpdated": "2024-08-04T15:33:05.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4350
Vulnerability from cvelistv5
Published
2011-01-03 19:26
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "name": "[oss-security] 20101215 CVE request: MantisBT \u003c=1.2.3 (db_type) Local File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/5" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "name": "[oss-security] 20101216 Re: CVE request: MantisBT \u003c=1.2.3 (db_type) Local File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-12T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-0002", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0002" }, { "name": "[oss-security] 20101215 CVE request: MantisBT \u003c=1.2.3 (db_type) Local File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/12/15/5" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/blog/?p=123" }, { "name": "[oss-security] 20101216 Re: CVE request: MantisBT \u003c=1.2.3 (db_type) Local File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/12/16/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=12607" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663230" }, { "name": "FEDORA-2010-19078", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php" }, { "name": "42772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42772" }, { "name": "FEDORA-2010-19070", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=112" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4350", "datePublished": "2011-01-03T19:26:00", "dateReserved": "2010-11-30T00:00:00", "dateUpdated": "2024-08-07T03:43:14.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2692
Vulnerability from cvelistv5
Published
2012-06-17 01:00
Modified
2024-08-06 19:42
Severity ?
EPSS score ?
Summary
MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:32.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "53921", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53921" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14016" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "[oss-security] 20120611 Re: CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120609 CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/mantisbt/mantisbt/commit/ceafe6f0c679411b81368052633a63dd3ca06d9c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-02T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2012-18299", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html" }, { "name": "53921", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53921" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/view.php?id=14016" }, { "name": "GLSA-201211-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml" }, { "name": "[oss-security] 20120611 Re: CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148" }, { "name": "51199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51199" }, { "name": "FEDORA-2012-18294", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html" }, { "name": "[oss-security] 20120609 CVE requests (x2) for Mantis Bug Tracker (MantisBT) before 1.2.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1" }, { "name": "FEDORA-2012-18273", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/mantisbt/mantisbt/commit/ceafe6f0c679411b81368052633a63dd3ca06d9c" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2692", "datePublished": "2012-06-17T01:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:32.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }