Vulnerability Name:

CVE-2008-4687 (CCN-45942)

Assigned:2008-10-16
Published:2008-10-16
Updated:2018-05-13
Summary:manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.5 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-4687

Source: CONFIRM
Type: UNKNOWN
http://mantisbt.svn.sourceforge.net/viewvc/mantisbt/branches/BRANCH_1_1_0/mantisbt/core/utility_api.php?r1=5679&r2=5678&pathrev=5679

Source: CCN
Type: SA32314
Mantis "sort" PHP Code Execution Vulnerability

Source: SECUNIA
Type: Vendor Advisory
32314

Source: SECUNIA
Type: UNKNOWN
32975

Source: SREASON
Type: UNKNOWN
4470

Source: CCN
Type: SourceForge.net: Files
Mantis, File Release Notes and Changelog, Release Name: 1.1.4

Source: CCN
Type: GLSA-200812-07
Mantis: Multiple vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200812-07

Source: CCN
Type: Mantis Bug Tracker Web site
Mantis Bug Tracker

Source: CONFIRM
Type: UNKNOWN
http://www.mantisbt.org/bugs/changelog_page.php

Source: CCN
Type: Mantis Bug ID: 0009704
Remote Code Execution in manage_proj_page.php

Source: CONFIRM
Type: UNKNOWN
http://www.mantisbt.org/bugs/view.php?id=0009704

Source: MLIST
Type: UNKNOWN
[oss-security] 20081019 CVE request: mantisbt < 1.1.4: RCE

Source: CCN
Type: OSVDB ID: 49157
Mantis manage_proj_page.php sort Parameter Arbitrary PHP Code Execution

Source: BID
Type: UNKNOWN
31789

Source: CCN
Type: BID-31789
Mantis 'manage_proj_page.php' PHP Code Injection Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://bugs.gentoo.org/show_bug.cgi?id=242722

Source: XF
Type: UNKNOWN
mantis-sort-code-execution(45942)

Source: XF
Type: UNKNOWN
mantis-sort-code-execution(45942)

Source: CCN
Type: Packet Storm Security [05-09-2018]
Mantis manage_proj_page PHP Code Execution

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-10-2018]

Source: EXPLOIT-DB
Type: UNKNOWN
44611

Source: EXPLOIT-DB
Type: UNKNOWN
6768

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mantis:mantis:0.19.3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:0.19.4:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:*:*:*:*:*:*:*:* (Version <= 1.1.3)

  • Configuration CCN 1:
  • cpe:/a:mantis:mantis:0.19.4:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:0.19.3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:mantis:mantis:1.0.7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mantis mantis 0.19.3
    mantis mantis 0.19.4
    mantis mantis 1.0.1
    mantis mantis 1.0.2
    mantis mantis 1.0.3
    mantis mantis 1.0.4
    mantis mantis 1.0.5
    mantis mantis 1.0.6
    mantis mantis 1.0.7
    mantis mantis 1.0.8
    mantis mantis 1.1.1
    mantis mantis 1.1.2
    mantis mantis *
    mantis mantis 0.19.4
    mantis mantis 1.0.1
    mantis mantis 1.0.8
    mantis mantis 1.1.1
    mantis mantis 0.19.3
    mantis mantis 1.0.2
    mantis mantis 1.0.3
    mantis mantis 1.0.4
    mantis mantis 1.0.5
    mantis mantis 1.0.6
    mantis mantis 1.1
    mantis mantis 1.1.2
    mantis mantis 1.1.3
    mantis mantis 1.0.7
    gentoo linux *