CVE-2015-1042 in MantisBT
Сводка (Английский)
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Резервировать
11.01.2015
Раскрытие
10.02.2015
Статус
Подтверждённый
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 74153 | MantisBT Regular Expression string_api.php string_sanitize_url Redirect | 601 | Не определено | Официальное исправление | CVE-2015-1042 |