CVE-2014-1608
Published: 18 March 2014
SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
Priority
Status
Package | Release | Status |
---|---|---|
mantis Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.2.16)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
References
- https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102
- http://www.ocert.org/advisories/ocert-2014-001.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1063111
- http://www.mantisbt.org/bugs/view.php?id=16879
- https://www.cve.org/CVERecord?id=CVE-2014-1608
- NVD
- Launchpad
- Debian