core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php.
References
Configurations
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2014/q4/931 - Exploit | |
References | () http://secunia.com/advisories/62101 - | |
References | () http://www.debian.org/security/2015/dsa-3120 - | |
References | () http://www.openwall.com/lists/oss-security/2014/12/03/11 - | |
References | () http://www.securityfocus.com/bid/71478 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/99128 - | |
References | () https://github.com/mantisbt/mantisbt/commit/e66ecc9f - | |
References | () https://www.mantisbt.org/bugs/view.php?id=17648 - Vendor Advisory |
Information
Published : 2014-12-12 11:59
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6316
Mitre link : CVE-2014-6316
CVE.ORG link : CVE-2014-6316
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE