Vulnerability Details : CVE-2019-15715
MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution.
Vulnerability category: Execute code
Products affected by CVE-2019-15715
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-15715
6.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-15715
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2019-15715
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-15715
-
https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52
Prevent arbitrary shell command execution · mantisbt/mantisbt@7092573 · GitHubPatch;Third Party Advisory
-
https://mantisbt.org/bugs/changelog_page.php?project=mantisbt
Change Log - MantisBTRelease Notes;Vendor Advisory
-
http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html
Mantis Bug Tracker 2.3.0 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://mantisbt.org/bugs/view.php?id=26162
0026162: CVE-2019-15715: Command Execution / Injection Vulnerability - MantisBTExploit;Issue Tracking;Vendor Advisory
-
https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501
Escape GraphViz command before calling proc_open() · mantisbt/mantisbt@5fb9796 · GitHubPatch;Third Party Advisory
-
https://mantisbt.org/bugs/view.php?id=26091
0026091: CVE-2019-15715: [Admin Required - Post Authentication] Command Execution / Injection Vulnerability - MantisBTExploit;Issue Tracking;Vendor Advisory
-
https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c
Prevent arbitrary shell command execution · mantisbt/mantisbt@fc7668c · GitHubPatch;Third Party Advisory
-
https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5
Escape GraphViz command before calling proc_open() · mantisbt/mantisbt@cebfb9a · GitHubPatch;Third Party Advisory
Jump to