First published: Fri Dec 12 2014(Updated: )
core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | <=1.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6316 is considered a medium severity vulnerability due to its potential for open redirect and phishing attacks.
To fix CVE-2014-6316, upgrade MantisBT to version 1.2.18 or later.
The main risks include unauthorized access through phishing attacks and potential exploitation via crafted URLs.
MantisBT versions prior to 1.2.18 are affected by CVE-2014-6316.
CVE-2014-6316 can enable remote attackers to conduct open redirect and phishing attacks.