[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-1608Date: (C)2014-11-20   (M)2023-12-22


SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
OSVDB-103118
SECUNIA-61432
BID-65445
DSA-3030
http://www.mantisbt.org/bugs/view.php?id=16879
http://www.ocert.org/advisories/ocert-2014-001.html
https://bugzilla.redhat.com/show_bug.cgi?id=1063111
https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102

CPE    18
cpe:/a:mantisbt:mantisbt:1.2.13
cpe:/o:debian:debian_linux:7.0
cpe:/a:mantisbt:mantisbt:1.2.14
cpe:/a:mantisbt:mantisbt:1.2.4
...
CWE    1
CWE-89
OVAL    3
oval:org.secpod.oval:def:106545
oval:org.secpod.oval:def:106505
oval:org.secpod.oval:def:601781

© SecPod Technologies