Vulnerability Description
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mantisbt | Mantisbt | <= 1.2.18 |
Related Weaknesses (CWE)
References
- http://seclists.org/oss-sec/2015/q1/158
- http://www.securitytracker.com/id/1031633
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100211
- https://www.htbridge.com/advisory/HTB23243
- https://www.mantisbt.org/bugs/view.php?id=17937
- https://www.mantisbt.org/bugs/view.php?id=17939Vendor Advisory
- http://seclists.org/oss-sec/2015/q1/158
- http://www.securitytracker.com/id/1031633
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100211
- https://www.htbridge.com/advisory/HTB23243
- https://www.mantisbt.org/bugs/view.php?id=17937
- https://www.mantisbt.org/bugs/view.php?id=17939Vendor Advisory
FAQ
What is CVE-2014-9572?
CVE-2014-9572 is a vulnerability with a CVSS score of 7.5 (HIGH). MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with th...
How severe is CVE-2014-9572?
CVE-2014-9572 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9572?
Check the references section above for vendor advisories and patch information. Affected products include: Mantisbt Mantisbt.