7.5

CVE-2014-1608

Exploit

SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MantisbtMantisbt Version <= 1.2.15
MantisbtMantisbt Version1.2.0
MantisbtMantisbt Version1.2.0 Updatealpha1
MantisbtMantisbt Version1.2.0 Updatealpha2
MantisbtMantisbt Version1.2.0 Updatealpha3
MantisbtMantisbt Version1.2.0 Updaterc1
MantisbtMantisbt Version1.2.0 Updaterc2
MantisbtMantisbt Version1.2.1
MantisbtMantisbt Version1.2.2
MantisbtMantisbt Version1.2.3
MantisbtMantisbt Version1.2.4
MantisbtMantisbt Version1.2.5
MantisbtMantisbt Version1.2.6
MantisbtMantisbt Version1.2.7
MantisbtMantisbt Version1.2.8
MantisbtMantisbt Version1.2.9
MantisbtMantisbt Version1.2.10
MantisbtMantisbt Version1.2.11
MantisbtMantisbt Version1.2.13
MantisbtMantisbt Version1.2.14
DebianDebian Linux Version7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.61% 0.671
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.