Total vulnerabilities in the database
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
Software | From | Fixed in |
---|---|---|
mantisbt / mantisbt | 1.2.13 | 1.2.13.x |
mantisbt / mantisbt | 1.2.15 | 1.2.15.x |
mantisbt / mantisbt | 1.2.2 | 1.2.2.x |
mantisbt / mantisbt | 1.2.0-rc1 | 1.2.0-rc1.x |
mantisbt / mantisbt | 1.2.12 | 1.2.12.x |
mantisbt / mantisbt | 1.2.18 | 1.2.18.x |
mantisbt / mantisbt | 1.2.5 | 1.2.5.x |
mantisbt / mantisbt | 1.2.10 | 1.2.10.x |
mantisbt / mantisbt | 1.2.9 | 1.2.9.x |
mantisbt / mantisbt | 1.2.8 | 1.2.8.x |
mantisbt / mantisbt | 1.2.16 | 1.2.16.x |
mantisbt / mantisbt | 1.2.11 | 1.2.11.x |
mantisbt / mantisbt | 1.2.3 | 1.2.3.x |
mantisbt / mantisbt | 1.2.6 | 1.2.6.x |
mantisbt / mantisbt | 1.2.1 | 1.2.1.x |
mantisbt / mantisbt | 1.2.7 | 1.2.7.x |
mantisbt / mantisbt | 1.2.17 | 1.2.17.x |
mantisbt / mantisbt | 1.2.4 | 1.2.4.x |
mantisbt / mantisbt | 1.2.0-rc2 | 1.2.0-rc2.x |
mantisbt / mantisbt | 1.2.14 | 1.2.14.x |
mantisbt / mantisbt | 1.2.0-alpha3 | 1.2.0-alpha3.x |