CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
82.6%
The remote web server is hosting MantisBT, an open source bug tracking application written in PHP.
Versions of MantisBT 1.1.x through 1.2.x prior to 1.2.18 are affected by the following vulnerabilities :
An information disclosure flaw exists in the ‘upgrade_unattended.php’ script through the ‘print_test_result’ parameter. A remote attacker could acquire SQL database credentials through a URL in the ‘hostname’ parameter and by reading the parameters in the response sent to the URL, allowing further compromise. (CVE-2014-9279)
An input validation flaw exists in the ‘projax_array_serialize_for_autocomplete’ function of the ‘core/projax_api.php’ script allowing cross-site scripting attacks.(CVE-2014-9270)
An API flaw exists due to an error in the script ‘api/soap/mc_project_api.php’ when utilizing the ‘mc_project_get_attachments’ function in conjunction with the ‘project_id’ parameter. This can be exploited by a remote attacker to cause a denial of service or to execute arbitrary SQL commands. This vulnerability is related to an incomplete fix for CVE-2014-1609. (CVE-2014-8554)
Binary data 8902.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8554
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9279
www.nessus.org/u?54499621
www.mantisbt.org/blog/?p=301
www.mantisbt.org/bugs/view.php?id=17583
www.mantisbt.org/bugs/view.php?id=17812
www.mantisbt.org/bugs/view.php?id=17877