Vulnerability Details : CVE-2014-1609
Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608.
Vulnerability category: Sql Injection
Products affected by CVE-2014-1609
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1609
0.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1609
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-1609
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1609
-
https://bugzilla.redhat.com/show_bug.cgi?id=1063111
1063111 – (CVE-2014-1608, CVE-2014-1609) CVE-2014-1608 CVE-2014-1609 mantis: SQL injection issues
-
http://www.securityfocus.com/bid/65461
MantisBT CVE-2014-1609 Multiple Unspecified SQL Injection Vulnerabilities
-
http://www.ocert.org/advisories/ocert-2014-001.html
oCERT archiveUS Government Resource
-
https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f
Fix CVE-2014-1609: SQL injection vulnerabilities · mantisbt/mantisbt@7efe017 · GitHubExploit;Patch
-
http://www.mantisbt.org/bugs/view.php?id=16880
0016880: CVE-2014-1609: SQL injection vulnerabilities - MantisBT
-
http://secunia.com/advisories/61432
Sign in
-
http://www.debian.org/security/2014/dsa-3030
Debian -- Security Information -- DSA-3030-1 mantis
Jump to