MantisBT 1.2.x < 1.2.18 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 8905

Synopsis

The remote web server is hosting a web application that is vulnerable to multiple attack vectors.

Description

The remote web server is hosting MantisBT, an open source bug tracking application written in PHP.

Versions of MantisBT 1.2.x prior to 1.2.18 are affected by the following vulnerabilities :

- An error exists in the file 'core/string_api.php' that could allow open redirect attacks. (CVE-2014-6316)

- An input validation flaw exists in 'helper_api.php' when the 'extended project browser' mode is enabled. This affects the 'project' cookie parameter, which could allow remote attackers to inject arbitrary web script or HTML into the page. (CVE-2014-9269)

- An input validation error exists in the 'string_insert_href' function affecting the URL protocol, allowing a remote attacker to perform cross-site scripting attacks via the 'javascript://' protocol. (CVE-2014-9272)

Solution

Upgrade to MantisBT 1.2.18 or later.

See Also

https://www.mantisbt.org/blog/?p=301

http://www.nessus.org/u?54499621

https://www.mantisbt.org/bugs/view.php?id=17297

https://www.mantisbt.org/bugs/view.php?id=17890

https://www.mantisbt.org/bugs/view.php?id=17648

Plugin Details

Severity: Medium

ID: 8905

Family: CGI

Published: 2/18/2015

Updated: 3/6/2019

Nessus ID: 80914

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mantisbt:mantisbt

Patch Publication Date: 12/6/2014

Vulnerability Publication Date: 12/5/2014

Reference Information

CVE: CVE-2014-6316, CVE-2014-9269, CVE-2014-9272

BID: 71478, 71368, 71375