First published: Mon Dec 08 2014(Updated: )
The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/MantisBT | <1.2.18 | 1.2.18 |
CentOS Libreport-plugin-mantisbt | <=1.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8553 has a medium severity rating as it allows remote attackers to access sensitive information.
To fix CVE-2014-8553, upgrade MantisBT to version 1.2.18 or later.
CVE-2014-8553 affects MantisBT versions prior to 1.2.18.
CVE-2014-8553 facilitates remote information disclosure attacks.
The best mitigation for CVE-2014-8553 is to apply the required software update as soon as possible.