CVE-2014-9279

NameCVE-2014-9279
DescriptionThe print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mantis (PTS)wheezy1.2.18-1vulnerable
wheezy (security)1.2.18-1+deb7u1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mantissource(unstable)(unfixed)unimportant
mantissourcesqueeze(unfixed)end-of-life

Notes

[squeeze] - mantis <end-of-life> (Unsupported in squeeze-lts)
http://github.com/mantisbt/mantisbt/commit/0826cef8
http://www.mantisbt.org/bugs/view.php?id=17877
unimportant, source affected but unrelevant for Debian, upgrade_unattended.php removed also in binary package

Search for package or bug name: Reporting problems