
CVE-2014-9573 – MantisBT 1.2.17 XSS / Improper Access Control / SQL Injection
https://notcve.org/view.php?id=CVE-2014-9573
26 Jan 2015 — SQL injection vulnerability in manage_user_page.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote administrators with FILE privileges to execute arbitrary SQL commands via the MANTIS_MANAGE_USERS_COOKIE cookie. Vulnerabilidad de inyección SQL en manage_user_page.php en MantisBT anterior a 1.2.19 y 1.3.x anterior a 1.3.0-beta.2 permite a administradores remotos con privilegios FILE ejecutar comandos SQL arbitrarios a través de la cookie MANTIS_MANAGE_USERS_COOKIE. MantisBT version 1.2... • https://packetstorm.news/files/id/130173 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2014-9506
https://notcve.org/view.php?id=CVE-2014-9506
04 Jan 2015 — MantisBT before 1.2.18 does not properly check permissions when sending an email that indicates when a monitored issue is related to another issue, which allows remote authenticated users to obtain sensitive information about restricted issues. MantisBT anterior a 1.2.18 no comprueba correctamente los permisos cuando envía una email que indica cuando un problema monitorizado está relacionado con otro problema, lo que permite a usuarios remotos autenticados obtener información sensible sobre los problemas re... • http://seclists.org/oss-sec/2014/q4/955 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2014-8553 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-8553
17 Dec 2014 — The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request. La función mci_account_get_array_by_id en api/soap/mc_account_api.php en MantisBT anteriores a 1.2.18, permite a atacantes remotos, obtener información sensible mediante peticiones SOAP (1) mc_project_get_users, (2) mc_issue_get, (3) mc_fi... • http://seclists.org/oss-sec/2014/q4/955 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2014-9388 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-9388
17 Dec 2014 — bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter. bug_report.php en MantisBT anterior a 1.2.18 permite a atacantes remotos a asignar código arbitrario mediante el parámetro handler_id. Multiple security issues have been found in the Mantis bug tracking system, which may result in phishing, information disclosure, CAPTCHA bypass, SQL injection, cross-site scripting or the execution of arbitrary PHP code. • http://seclists.org/oss-sec/2014/q4/955 • CWE-284: Improper Access Control •

CVE-2014-6316 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-6316
12 Dec 2014 — core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php. core/string_api.php en MantisBT anterior a 1.2.18 no categoriza correctamente las URLs cuando funciona bajo el root web, lo que permite a atacantes remotos realizar ataques de redirección abierta y phishing a través de una URL manipulada en el parámetro return e... • http://seclists.org/oss-sec/2014/q4/931 •

CVE-2014-9281 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-9281
09 Dec 2014 — Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field. Vulnerabilidad de XSS en admin/copy_field.php en MantisBT anterior a 1.2.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo dest_id. Multiple security issues have been found in the Mantis bug tracking system, which may result in phishing, information disclosure, CAPTCHA bypass, SQ... • http://seclists.org/oss-sec/2014/q4/867 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2014-9270 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-9270
08 Dec 2014 — Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field. Vulnerabilidad de XSS en la función projax_array_serialize_for_autocomplete en core/projax_api.php en MantisBT 1.1.0a3 hasta 1.2.17 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo 'profile/Platform'. Multip... • http://seclists.org/oss-sec/2014/q4/867 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2014-9279
https://notcve.org/view.php?id=CVE-2014-9279
08 Dec 2014 — The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL. La función print_test_result en admin/upgrade_unattended.php en MantisBT 1.1.0a3 hasta 1.2.x anterior a 1.2.18 permite a atacantes remotos obtener las credenciales de la base de datos a través de una URL en el parámetro hostname y la lectura de los p... • http://seclists.org/oss-sec/2014/q4/863 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2014-9280 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-9280
08 Dec 2014 — The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter. La función current_user_get_bug_filter en core/current_user_api.php en MantisBT anterior a 1.2.18 permite a atacantes remotos ejecutar código PHP arbitrario a través del parámetro filter. Multiple security issues have been found in the Mantis bug tracking system, which may result in phishing, information disclosure, CAPTCHA bypass, SQ... • http://seclists.org/oss-sec/2014/q4/864 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2014-9117 – Debian Security Advisory 3120-1
https://notcve.org/view.php?id=CVE-2014-9117
06 Dec 2014 — MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0. MantisBT anterior a 1.2.18 utiliza el valor del parámetro public_key como la clave para la respuesta CAPTCHA, lo que permite a atacantes remotos evadir el mecanismo de protección CAPTCHA mediante el aprovechamiento ... • http://secunia.com/advisories/62101 • CWE-284: Improper Access Control •