Vulnerability Details : CVE-2008-4687
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
Vulnerability category: Execute code
At least one public exploit which can be used to exploit this vulnerability exists!
Exploit prediction scoring system (EPSS) score for CVE-2008-4687
Probability of exploitation activity in the next 30 days: 97.32%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2008-4687
-
Mantis manage_proj_page PHP Code Execution
Disclosure Date : 2008-10-16exploit/multi/http/mantisbt_manage_proj_page_rceMantis v1.1.3 and earlier are vulnerable to a post-authentication Remote Code Execution vulnerability in the sort parameter of the manage_proj_page.php page. Authors: - EgiX - Lars Sorenson
CVSS scores for CVE-2008-4687
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
[email protected] |
CWE ids for CVE-2008-4687
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: [email protected] (Primary)
References for CVE-2008-4687
-
http://mantisbt.svn.sourceforge.net/viewvc/mantisbt/branches/BRANCH_1_1_0/mantisbt/core/utility_api.php?r1=5679&r2=5678&pathrev=5679
-
https://bugs.gentoo.org/show_bug.cgi?id=242722
-
http://securityreason.com/securityalert/4470
-
https://www.exploit-db.com/exploits/6768
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45942
- http://www.mantisbt.org/bugs/changelog_page.php
-
http://www.openwall.com/lists/oss-security/2008/10/19/1
-
http://www.securityfocus.com/bid/31789
-
https://www.exploit-db.com/exploits/44611/
- http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml
-
http://www.mantisbt.org/bugs/view.php?id=0009704
Products affected by CVE-2008-4687
- cpe:2.3:a:mantis:mantis:*:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:1.0.7:*:*:*:*:*:*:*