{ "id": "CVE-2015-1042", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:00.060", "lastModified": "2021-01-12T18:05:59.507", "vulnStatus": "Analyzed", "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", "value": "The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a \":/\" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316." }, { "lang": "es", "value": "La funci\u00f3n string_sanitize_url en core/string_api.php en MantisBT 1.2.0a3 hasta 1.2.18 utiliza una expresi\u00f3n regular incorrecta, lo que permite a atacantes remotos realizar ataques de redirecci\u00f3n abierta y phishing a trav\u00e9s de una URL con un separador ':/' (dos puntos barra oblicua) en el par\u00e1metro return en login_page.php, una vulnerabilidad diferente a CVE-2014-6316." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 5.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3461212B-A96B-4D38-A722-84E7418C2A7A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7B6DEE14-744B-4DE4-BDCF-E4E4D37F70A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D4462BEE-39B6-47BD-B08F-5BE1FD918221" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F32DFF4-6448-46FD-9358-4FB1C310EC2E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "20328CE4-0488-43B8-AA64-A6CB2230C74C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0BDEB950-D3F4-4B96-B456-B8441DC403D9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "FE69E6A6-8CD2-4C8A-A30A-CB0A04AC539F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "D464F7CF-A156-4EE5-BB59-6C759448EB23" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "C97BF96E-2FD0-4D5E-B736-8CCE6E8A34B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "5F1BFB72-CDD6-466E-ACAD-EA442D11C22F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD11DD1B-EC1C-48F4-B4C6-1CF6A0F80970" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "5899A557-AC72-4CB0-984F-F274AE5932BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F75A6F79-C5D5-4612-9976-B54664A5E29E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "4C54ABCB-AD1B-4C34-927A-D9D560EA4C07" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "F5F8FB8B-C009-4BF5-B3C3-142FFD0BD5F3" } ] } ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://seclists.org/fulldisclosure/2015/Jan/110", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5", "source": "cve@mitre.org" }, { "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8", "source": "cve@mitre.org" }, { "url": "http://www.securitytracker.com/id/1031633", "source": "cve@mitre.org" }, { "url": "https://www.mantisbt.org/bugs/view.php?id=17997", "source": "cve@mitre.org" } ] }