Vulnerability Details : CVE-2014-8554
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
Vulnerability category: Sql Injection
Products affected by CVE-2014-8554
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-8554
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8554
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-8554
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8554
-
http://www.debian.org/security/2015/dsa-3120
Debian -- Security Information -- DSA-3120-1 mantis
-
http://www.securityfocus.com/bid/70856
MantisBT Incomplete Fix Multiple SQL Injection Vulnerabilities
-
http://seclists.org/oss-sec/2014/q4/487
oss-sec: Re: SQL injection vulnerability in MantisBT SOAP API [CVE-2014-8554]Exploit
-
http://www.mantisbt.org/bugs/view.php?id=17812
0017812: CVE-2014-8554: SQL injection in SOAP API - MantisBTExploit;Vendor Advisory
-
http://secunia.com/advisories/62101
Sign in
-
http://www.mantisbt.org/bugs/view.php?id=16880
0016880: CVE-2014-1609: SQL injection vulnerabilities - MantisBT
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/98457
MantisBT proj_doc_page.php SQL injection CVE-2014-8554 Vulnerability Report
-
http://seclists.org/oss-sec/2014/q4/479
oss-sec: RE: SQL injection vulnerability in MantisBT SOAP API
Jump to