CVE-2014-1608
Published Mar 18, 2014
Last updated 4 years ago
Overview
- Description
- SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED59DEDF-08A2-4BEB-9DE3-0205CA2D69B4", "versionEndIncluding": "1.2.15" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DA2615A-CD65-4765-AB0A-D72C2BEB00F5" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D09CC46-DFA2-408D-8720-05C23E73C859" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA" } ], "operator": "OR" } ] } ]