CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
82.2%
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a “:/” (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
Vendor | Product | Version | CPE |
---|---|---|---|
mantisbt | mantisbt | 1.2.0 | cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.0 | cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.0 | cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.1 | cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.2 | cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.3 | cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.4 | cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.5 | cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.6 | cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:* |
mantisbt | mantisbt | 1.2.7 | cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:* |