The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
https://github.com/mantisbt/mantisbt/commit/80a15487 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/07/28 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98573 | vdb entry |
http://www.securityfocus.com/bid/70996 | vdb entry |
http://www.mantisbt.org/bugs/view.php?id=17780 | vendor advisory |
http://secunia.com/advisories/62101 | third party advisory |
http://www.debian.org/security/2015/dsa-3120 | vendor advisory |