Vulnerability Details : CVE-2011-3357
Potential exploit
Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php.
Vulnerability category: Directory traversal
Products affected by CVE-2011-3357
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-3357
2.00%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-3357
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-3357
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3357
-
http://www.openwall.com/lists/oss-security/2011/09/04/2
oss-security - Re: CVE requests: <mantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)
-
http://www.securityfocus.com/archive/1/519547/100/0/threaded
SecurityFocus
-
https://bugzilla.redhat.com/show_bug.cgi?id=735514
735514 – (CVE-2011-3356, CVE-2011-3357, CVE-2011-3358, CVE-2011-3578) CVE-2011-3356 CVE-2011-3357 CVE-2011-3358 CVE-2011-3578 mantis: multiple flaws fixed in 1.2.8Exploit;Patch
-
http://www.mantisbt.org/bugs/view.php?id=13281
0013281: MantisBT Security Vulnerabilities Notification - MantisBTExploit
-
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html
Multiple Vulnerabilities in MantisBT - HTB23045 Security Advisory | ImmuniWebExploit
-
https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d
Rework the bug action group api such that we can easily convert this … · mantisbt/mantisbt@5b93161 · GitHubPatch
-
http://www.openwall.com/lists/oss-security/2011/09/09/9
oss-security - Re: CVE requests: <mantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)Exploit
-
http://security.gentoo.org/glsa/glsa-201211-01.xml
MantisBT: Multiple vulnerabilities (GLSA 201211-01) — Gentoo security
-
http://www.openwall.com/lists/oss-security/2011/09/04/1
oss-security - CVE requests: <mantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)Exploit
-
http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html
Security Fix for mantis stable 1.1.8Exploit
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297
#640297 - MantisBT <1.2.8 multiple vulnerabilities (LFI/XSS/remote arbitrary code execution) - Debian Bug report logsExploit;Patch
-
http://securityreason.com/securityalert/8392
MantisBT CMS Multiple Vulnerabilities(SQL/XSS) - CXSecurity.com
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html
[SECURITY] Fedora 15 Update: mantis-1.2.8-1.fc15Exploit
-
http://www.securityfocus.com/bid/49448
MantisBT Multiple Local File Include and Cross Site Scripting Vulnerabilities
-
https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f
Fix #11481: Don't show bug group actions that can't be used · mantisbt/mantisbt@6ede60d · GitHubPatch
-
http://www.debian.org/security/2011/dsa-2308
Debian -- Security Information -- DSA-2308-1 mantis
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/69588
MantisBT action file include CVE-2011-3357 Vulnerability Report
Jump to