The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 up to and including 1.2.18 uses an incorrect regular expression, which allows remote malicious users to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mantisbt mantisbt 1.2.17 |
||
mantisbt mantisbt 1.2.18 |
||
mantisbt mantisbt 1.2.2 |
||
mantisbt mantisbt 1.2.3 |
||
mantisbt mantisbt 1.2.0 |
||
mantisbt mantisbt 1.2.13 |
||
mantisbt mantisbt 1.2.15 |
||
mantisbt mantisbt 1.2.5 |
||
mantisbt mantisbt 1.2.7 |
||
mantisbt mantisbt 1.2.1 |
||
mantisbt mantisbt 1.2.10 |
||
mantisbt mantisbt 1.2.11 |
||
mantisbt mantisbt 1.2.8 |
||
mantisbt mantisbt 1.2.9 |
||
mantisbt mantisbt 1.2.12 |
||
mantisbt mantisbt 1.2.14 |
||
mantisbt mantisbt 1.2.16 |
||
mantisbt mantisbt 1.2.4 |
||
mantisbt mantisbt 1.2.6 |