First published: Wed Aug 24 2005(Updated: )
core/database_api.php in Mantis 0.19.0a1 through 1.0.0a3, with register_globals enabled, allows remote attackers to connect to internal databases by modifying the g_db_type variable and monitoring the speed of responses, as identified by bug#0005956.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mentiss Acgv Acgvannu | =0.19.0 | |
Mentiss Acgv Acgvannu | =0.19.0_rc1 | |
Mentiss Acgv Acgvannu | =0.19.0a1 | |
Mentiss Acgv Acgvannu | =0.19.0a2 | |
Mentiss Acgv Acgvannu | =0.19.1 | |
Mentiss Acgv Acgvannu | =0.19.2 | |
Mentiss Acgv Acgvannu | =1.0.0a1 | |
Mentiss Acgv Acgvannu | =1.0.0a2 | |
Mentiss Acgv Acgvannu | =1.0.0a3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2556 is considered to be of medium severity due to its ability to allow remote attackers to connect to internal databases.
To fix CVE-2005-2556, disable register_globals in your PHP configuration and upgrade to a patched version of Mantis.
CVE-2005-2556 affects Mantis versions 0.19.0a1 through 1.0.0a3 with register_globals enabled.
CVE-2005-2556 allows remote code execution attacks by manipulating the g_db_type variable to gain unauthorized access to internal databases.
Yes, updating to a version of Mantis released after 1.0.0a3 will remediate the vulnerability, along with disabling register_globals.