MantisBT 1.1.x < 1.2.18 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 8902


The remote web server is hosting a web application that is vulnerable to multiple attack vectors.


The remote web server is hosting MantisBT, an open source bug tracking application written in PHP.

Versions of MantisBT 1.1.x through 1.2.x prior to 1.2.18 are affected by the following vulnerabilities :

- An information disclosure flaw exists in the 'upgrade_unattended.php' script through the 'print_test_result' parameter. A remote attacker could acquire SQL database credentials through a URL in the 'hostname' parameter and by reading the parameters in the response sent to the URL, allowing further compromise. (CVE-2014-9279)

- An input validation flaw exists in the 'projax_array_serialize_for_autocomplete' function of the 'core/projax_api.php' script allowing cross-site scripting attacks.(CVE-2014-9270)

- An API flaw exists due to an error in the script 'api/soap/mc_project_api.php' when utilizing the 'mc_project_get_attachments' function in conjunction with the 'project_id' parameter. This can be exploited by a remote attacker to cause a denial of service or to execute arbitrary SQL commands. This vulnerability is related to an incomplete fix for CVE-2014-1609. (CVE-2014-8554)


Upgrade to MantisBT 1.2.18 or later.

See Also

Plugin Details

Severity: Medium

ID: 8902

File Name: 8902.prm

Family: CGI

Published: 2015/02/18

Modified: 2016/01/21

Dependencies: 8680

Nessus ID: 80914

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 4.8

Temporal Score: 4.5


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mantisbt:mantisbt

Patch Publication Date: 2014/12/06

Vulnerability Publication Date: 2014/12/05

Reference Information

CVE: CVE-2014-9279, CVE-2014-9270, CVE-2014-8554

BID: 71359, 71372, 70856