Vulnerability Description
gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mantisbt | Mantisbt | <= 1.2.17 |
Related Weaknesses (CWE)
References
- http://www.mantisbt.org/bugs/view.php?id=17640ExploitVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/09/12/11
- http://www.openwall.com/lists/oss-security/2014/09/12/14
- http://www.openwall.com/lists/oss-security/2014/09/13/1
- http://www.mantisbt.org/bugs/view.php?id=17640ExploitVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/09/12/11
- http://www.openwall.com/lists/oss-security/2014/09/12/14
- http://www.openwall.com/lists/oss-security/2014/09/13/1
FAQ
What is CVE-2014-6387?
CVE-2014-6387 is a vulnerability with a CVSS score of 5.0 (MEDIUM). gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind.
How severe is CVE-2014-6387?
CVE-2014-6387 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6387?
Check the references section above for vendor advisories and patch information. Affected products include: Mantisbt Mantisbt.