Vulnerability Details : CVE-2014-8553
The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.
Vulnerability category: Information leak
Products affected by CVE-2014-8553
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-8553
0.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8553
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-8553
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8553
-
http://seclists.org/oss-sec/2014/q4/955
oss-sec: MantisBT 1.2.18 Released
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/99257
MantisBT mc_account_api.php information disclosure CVE-2014-8553 Vulnerability Report
-
https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5
SOAP API: apply access control to mci_account_get_array_by_id · mantisbt/mantisbt@f779e3d · GitHub
-
http://www.debian.org/security/2015/dsa-3120
Debian -- Security Information -- DSA-3120-1 mantis
-
https://www.mantisbt.org/bugs/changelog_page.php?version_id=191
Change Log - MantisBT
-
https://www.mantisbt.org/bugs/view.php?id=17243
0017243: CVE-2014-8553: SOAP API: leak of user personal information - MantisBTVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1171783
1171783 – (CVE-2014-8553) CVE-2014-8553 mantis: user real name and email disclosure in SOAP API
-
http://secunia.com/advisories/62101
Sign in
Jump to