Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-63qw-955w-2x9f

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

EPSS

Процентиль: 69%
0.0062
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

nvd
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

debian
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1. ...

EPSS

Процентиль: 69%
0.0062
Низкий