SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
12 Jan 2021, 18:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mantisbt:mantisbt:1.2.0:a1:*:*:*:*:*:* cpe:2.3:a:mantisbt:mantisbt:1.2.0:a2:*:*:*:*:*:* |
cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:* cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:* cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:* |
Information
Published : 2014-03-18 17:03
Updated : 2023-12-10 11:31
NVD link : CVE-2014-1608
Mitre link : CVE-2014-1608
CVE.ORG link : CVE-2014-1608
JSON object : View
Products Affected
debian
- debian_linux
mantisbt
- mantisbt
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')