First published: Thu Nov 13 2014(Updated: )
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | <=1.2.17 | |
CentOS Libreport-plugin-mantisbt | =0.18.0 | |
CentOS Libreport-plugin-mantisbt | =0.19.0 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-a1 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-a2 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =0.19.0a1 | |
CentOS Libreport-plugin-mantisbt | =0.19.0a2 | |
CentOS Libreport-plugin-mantisbt | =0.19.1 | |
CentOS Libreport-plugin-mantisbt | =0.19.2 | |
CentOS Libreport-plugin-mantisbt | =0.19.3 | |
CentOS Libreport-plugin-mantisbt | =0.19.4 | |
CentOS Libreport-plugin-mantisbt | =0.19.5 | |
CentOS Libreport-plugin-mantisbt | =1.0.0 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-a1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-a2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-a3 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc3 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc4 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc5 | |
CentOS Libreport-plugin-mantisbt | =1.0.0a1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0a2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0a3 | |
CentOS Libreport-plugin-mantisbt | =1.0.1 | |
CentOS Libreport-plugin-mantisbt | =1.0.2 | |
CentOS Libreport-plugin-mantisbt | =1.0.3 | |
CentOS Libreport-plugin-mantisbt | =1.0.4 | |
CentOS Libreport-plugin-mantisbt | =1.0.5 | |
CentOS Libreport-plugin-mantisbt | =1.0.6 | |
CentOS Libreport-plugin-mantisbt | =1.0.7 | |
CentOS Libreport-plugin-mantisbt | =1.0.8 | |
CentOS Libreport-plugin-mantisbt | =1.0.9 | |
CentOS Libreport-plugin-mantisbt | =1.1.0 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a1 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a2 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a3 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a4 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-rc3 | |
CentOS Libreport-plugin-mantisbt | =1.1.1 | |
CentOS Libreport-plugin-mantisbt | =1.1.2 | |
CentOS Libreport-plugin-mantisbt | =1.1.3 | |
CentOS Libreport-plugin-mantisbt | =1.1.4 | |
CentOS Libreport-plugin-mantisbt | =1.1.5 | |
CentOS Libreport-plugin-mantisbt | =1.1.6 | |
CentOS Libreport-plugin-mantisbt | =1.1.7 | |
CentOS Libreport-plugin-mantisbt | =1.1.8 | |
CentOS Libreport-plugin-mantisbt | =1.1.9 | |
CentOS Libreport-plugin-mantisbt | =1.2.0 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-alpha1 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-alpha2 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-alpha3 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.2.0a1 | |
CentOS Libreport-plugin-mantisbt | =1.2.0a2 | |
CentOS Libreport-plugin-mantisbt | =1.2.1 | |
CentOS Libreport-plugin-mantisbt | =1.2.2 | |
CentOS Libreport-plugin-mantisbt | =1.2.3 | |
CentOS Libreport-plugin-mantisbt | =1.2.4 | |
CentOS Libreport-plugin-mantisbt | =1.2.5 | |
CentOS Libreport-plugin-mantisbt | =1.2.6 | |
CentOS Libreport-plugin-mantisbt | =1.2.7 | |
CentOS Libreport-plugin-mantisbt | =1.2.8 | |
CentOS Libreport-plugin-mantisbt | =1.2.9 | |
CentOS Libreport-plugin-mantisbt | =1.2.10 | |
CentOS Libreport-plugin-mantisbt | =1.2.11 | |
CentOS Libreport-plugin-mantisbt | =1.2.12 | |
CentOS Libreport-plugin-mantisbt | =1.2.13 | |
CentOS Libreport-plugin-mantisbt | =1.2.14 | |
CentOS Libreport-plugin-mantisbt | =1.2.15 | |
CentOS Libreport-plugin-mantisbt | =1.2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8554 is classified as a high severity SQL injection vulnerability that can allow remote attackers to execute arbitrary SQL commands.
To fix CVE-2014-8554, upgrade MantisBT to version 1.2.18 or later, which addresses the SQL injection vulnerability.
CVE-2014-8554 affects all MantisBT versions prior to 1.2.18, including versions 0.18.0 through 1.2.16.
Exploiting CVE-2014-8554 can lead to unauthorized access to the database, allowing attackers to manipulate data or obtain sensitive information.
Yes, public knowledge of the vulnerability suggests that exploit methods may exist, highlighting the importance of applying the necessary patches.