Lucene search

K
archlinuxArch LinuxASA-201411-8
HistoryNov 12, 2014 - 12:00 a.m.

mantisbt: arbitrary code execution and unrestricted access

2014-11-1200:00:00
Arch Linux
lists.archlinux.org
29

EPSS

0.353

Percentile

97.2%

  • CVE-2014-7146 (arbitrary code execution)
    When importing data with the plugin, user input passed through the
    "description" field (and the "issuelink" attribute) of the uploaded XML
    file isn’t properly sanitized before being used in a call to the
    preg_replace() function which uses the ‘e’ modifier. This can be
    exploited to inject and execute arbitrary PHP code when the
    Import/Export plugin is installed.

  • CVE-2014-8598 (unrestricted access, information disclosure)
    The bundled XML Import/Export plugin does not perform any access level
    checks in the import and export pages. This allows any user knowing the
    URL to the plugin’s page to insert or export any (confidential) data
    without restriction, regardless of their access level.
    This vulnerability is particularly dangerous when used in combination
    with the one described above (CVE-2014-7146) as it makes the access
    complexity very simple, allowing unauthenticated attackers to execute
    arbitrary code.

OSVersionArchitecturePackageVersionFilename
anyanyanymantisbt< 1.2.17-4UNKNOWN