Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1042

Опубликовано: 10 фев. 2015
Источник: debian
EPSS Низкий

Описание

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mantisremovedpackage
mantisno-dsawheezypackage
mantisnot-affectedsqueezepackage

Примечания

  • https://www.mantisbt.org/bugs/view.php?id=17997

  • http://github.com/mantisbt/mantisbt/commit/d95f070d

EPSS

Процентиль: 70%
0.0062
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

nvd
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

github
больше 3 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

EPSS

Процентиль: 70%
0.0062
Низкий