Vulnerability Details : CVE-2014-9280
The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter.
Products affected by CVE-2014-9280
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9280
3.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9280
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-9280
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9280
-
http://seclists.org/oss-sec/2014/q4/923
oss-sec: Re: CVE request: PHP Object Injection in MantisBT filter API
-
http://www.debian.org/security/2015/dsa-3120
Debian -- Security Information -- DSA-3120-1 mantis
-
http://www.mantisbt.org/bugs/view.php?id=17875
0017875: CVE-2014-9280: PHP Object Injection in filter API - MantisBTVendor Advisory
-
https://github.com/mantisbt/mantisbt/commit/599364b2
Do not pass raw user data to unserialize · mantisbt/mantisbt@599364b · GitHubExploit
-
http://secunia.com/advisories/62101
Sign in
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/99016
MantisBT current_user_get_bug_filter() code execution CVE-2014-9280 Vulnerability Report
-
http://seclists.org/oss-sec/2014/q4/864
oss-sec: CVE request: PHP Object Injection in MantisBT filter API
-
http://www.securityfocus.com/bid/71361
MantisBT 'core/current_user_api.php' PHP Object Injection Vulnerability
Jump to