Vulnerability Name:

CVE-2006-6515 (CCN-30958)

Assigned:2006-12-07
Published:2006-12-07
Updated:2008-09-05
Summary:Mantis before 1.1.0a2 sets the default value of $g_bug_reminder_threshold to "reporter" instead of a more privileged role, which has unknown impact and attack vectors, possibly related to frequency of reminders.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2006-6515

Source: CCN
Type: SourceForge.net: Files
Mantis - File Release Notes and Changelog - Release Name: 1.1.0a2

Source: CONFIRM
Type: Patch
http://sourceforge.net/project/shownotes.php?release_id=469627

Source: CCN
Type: Mantis Web site
Mantis Bug Tracker | Download

Source: CONFIRM
Type: UNKNOWN
http://www.mantisbugtracker.com/changelog.php

Source: CCN
Type: OSVDB ID: 37108
Mantis $g_bug_reminder_threshold Reporter Privilege Escalation

Source: XF
Type: UNKNOWN
mantis-gbugreminderthreshold-unspecified(30958)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mantis:mantis:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0_rc5:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:*:*:*:*:*:*:*:* (Version <= 1.1.0a1)

  • * Denotes that component is vulnerable
    BACK
    mantis mantis 1.0.0
    mantis mantis 1.0.0_rc1
    mantis mantis 1.0.0_rc2
    mantis mantis 1.0.0_rc3
    mantis mantis 1.0.0_rc4
    mantis mantis 1.0.0_rc5
    mantis mantis 1.0.0a1
    mantis mantis 1.0.0a2
    mantis mantis 1.0.0a3
    mantis mantis 1.0.1
    mantis mantis 1.0.2
    mantis mantis 1.0.3
    mantis mantis 1.0.4
    mantis mantis 1.0.5
    mantis mantis 1.0.6
    mantis mantis *