The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier.
References
Configurations
History
21 Nov 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2014/q4/576 - | |
References | () http://secunia.com/advisories/62101 - | |
References | () http://www.debian.org/security/2015/dsa-3120 - | |
References | () http://www.mantisbt.org/bugs/view.php?id=17725 - | |
References | () http://www.securityfocus.com/bid/70993 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98572 - | |
References | () https://github.com/mantisbt/mantisbt/commit/84017535 - Vendor Advisory | |
References | () https://github.com/mantisbt/mantisbt/commit/bed19db9 - Vendor Advisory |
Information
Published : 2014-11-18 15:59
Updated : 2024-11-21 02:16
NVD link : CVE-2014-7146
Mitre link : CVE-2014-7146
CVE.ORG link : CVE-2014-7146
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-20
Improper Input Validation