MantisBT 1.2.13 < 1.2.17 SQLi

medium Nessus Network Monitor Plugin ID 8901

Synopsis

The remote web server is hosting a web application that is affected by an SQL injection vulnerability.

Description

The remote web server is hosting MantisBT, an open source bug tracking application written in PHP.

Versions of MantisBT 1.2.13 prior to 1.2.17 are affected by an input validation error related to the 'filter_config_id' parameter in the script 'admin_config_report.php', which could allow SQL injection attacks. This may allow an authenticated remote attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.

Solution

Upgrade to MantisBT 1.2.17 or later.

See Also

http://www.mantisbt.org/blog/?p=288

http://www.nessus.org/u?c4947042

http://seclists.org/oss-sec/2014/q1/490

http://mantisbt.domainunion.de/bugs/view.php?id=17055

Plugin Details

Severity: Medium

ID: 8901

Family: CGI

Published: 2/18/2015

Updated: 3/6/2019

Nessus ID: 80913

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 6

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mantisbt:mantisbt

Patch Publication Date: 3/4/2014

Vulnerability Publication Date: 2/28/2014

Reference Information

CVE: CVE-2014-2238

BID: 65903