First published: Tue Jan 30 2018(Updated: )
** DISPUTED ** MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mantisbt Mantisbt | =2.10.0 | |
=2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6382 is a vulnerability in MantisBT 2.10.0 that allows local users to conduct SQL Injection attacks.
CVE-2018-6382 works by exploiting the 'sql' parameter in a request to the 127.0.0.1 IP address.
CVE-2018-6382 has a severity keyword of 'low' and a severity value of 3.3.
MantisBT 2.10.0 is affected by CVE-2018-6382.
To fix CVE-2018-6382, update MantisBT to a version that is not affected or apply the vendor's security patch.