CVE-2015-1042
Published Feb 10, 2015
Last updated 4 years ago
Overview
- Description
- The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- <a href="http://cwe.mitre.org/data/definitions/601.html">CWE-601: URL Redirection to Untrusted Site ('Open Redirect')</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07" }, { "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5F8FB8B-C009-4BF5-B3C3-142FFD0BD5F3" } ], "operator": "OR" } ] } ]