Vulnerability Details : CVE-2014-1608
SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
Vulnerability category: Sql Injection
Products affected by CVE-2014-1608
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1608
0.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1608
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-1608
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1608
-
https://bugzilla.redhat.com/show_bug.cgi?id=1063111
1063111 – (CVE-2014-1608, CVE-2014-1609) CVE-2014-1608 CVE-2014-1609 mantis: SQL injection issues
-
http://www.ocert.org/advisories/ocert-2014-001.html
oCERT archiveUS Government Resource
-
http://www.mantisbt.org/bugs/view.php?id=16879
0016879: CVE-2014-1608: soap:Envelope SQL injection attack - MantisBT
-
http://www.securityfocus.com/bid/65445
MantisBT 'mc_issue_attachment_get' SOAP API SQL Injection Vulnerability
-
http://secunia.com/advisories/61432
Sign in
-
http://www.debian.org/security/2014/dsa-3030
Debian -- Security Information -- DSA-3030-1 mantis
-
https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102
Fix CVE-2014-1608: mc_issue_attachment_get SQL injection · mantisbt/mantisbt@00b4c17 · GitHubExploit;Patch
Jump to