Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-1042

Опубликовано: 10 фев. 2015
Источник: nvd
CVSS2: 5.8
EPSS Низкий

Описание

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.18:*:*:*:*:*:*:*

EPSS

Процентиль: 70%
0.0062
Низкий

5.8 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

debian
почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1. ...

github
больше 3 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

EPSS

Процентиль: 70%
0.0062
Низкий

5.8 Medium

CVSS2

Дефекты

NVD-CWE-Other