First published: Wed Oct 22 2008(Updated: )
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mentiss Acgv Acgvannu | <=1.1.3 | |
Mentiss Acgv Acgvannu | =0.19.3 | |
Mentiss Acgv Acgvannu | =0.19.4 | |
Mentiss Acgv Acgvannu | =1.0.1 | |
Mentiss Acgv Acgvannu | =1.0.2 | |
Mentiss Acgv Acgvannu | =1.0.3 | |
Mentiss Acgv Acgvannu | =1.0.4 | |
Mentiss Acgv Acgvannu | =1.0.5 | |
Mentiss Acgv Acgvannu | =1.0.6 | |
Mentiss Acgv Acgvannu | =1.0.7 | |
Mentiss Acgv Acgvannu | =1.0.8 | |
Mentiss Acgv Acgvannu | =1.1.1 | |
Mentiss Acgv Acgvannu | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4687 has a medium severity rating as it allows remote authenticated users to execute arbitrary code.
To fix CVE-2008-4687, you should upgrade Mantis to version 1.1.4 or later, which addresses this vulnerability.
CVE-2008-4687 affects Mantis versions prior to 1.1.4, including 0.19.3, 0.19.4, and various 1.0.x versions.
Yes, CVE-2008-4687 can be exploited remotely by authenticated users through specially crafted sort parameters.
The attack vector for CVE-2008-4687 involves manipulating the sort parameter in the manage_proj_page.php script, leading to arbitrary code execution.