5.8

CVE-2015-1042

Exploit

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

Data is provided by the National Vulnerability Database (NVD)
MantisbtMantisbt Version1.2.0 Updatealpha3
MantisbtMantisbt Version1.2.0 Updaterc1
MantisbtMantisbt Version1.2.0 Updaterc2
MantisbtMantisbt Version1.2.1
MantisbtMantisbt Version1.2.2
MantisbtMantisbt Version1.2.3
MantisbtMantisbt Version1.2.4
MantisbtMantisbt Version1.2.5
MantisbtMantisbt Version1.2.6
MantisbtMantisbt Version1.2.7
MantisbtMantisbt Version1.2.8
MantisbtMantisbt Version1.2.9
MantisbtMantisbt Version1.2.10
MantisbtMantisbt Version1.2.11
MantisbtMantisbt Version1.2.12
MantisbtMantisbt Version1.2.13
MantisbtMantisbt Version1.2.14
MantisbtMantisbt Version1.2.15
MantisbtMantisbt Version1.2.16
MantisbtMantisbt Version1.2.17
MantisbtMantisbt Version1.2.18
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.62% 0.688
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N