MantisBT before 1.3.20 and 2.22.1 allows Post Authentication Command Injection, leading to Remote Code Execution.
References
Link | Resource |
---|---|
https://mantisbt.org/bugs/changelog_page.php?project=mantisbt | Release Notes Vendor Advisory |
https://mantisbt.org/bugs/view.php?id=26162 | Exploit Issue Tracking Vendor Advisory |
https://github.com/mantisbt/mantisbt/commit/7092573fac31eff41823f13540324db167c8bd52 | Patch Third Party Advisory |
https://github.com/mantisbt/mantisbt/commit/cebfb9acb3686e8904d80bd4bc80720b54ba08e5 | Patch Third Party Advisory |
https://github.com/mantisbt/mantisbt/commit/fc7668c8e45db55fc3a4b991ea99d2b80861a14c | Patch Third Party Advisory |
https://mantisbt.org/bugs/view.php?id=26091 | Exploit Issue Tracking Vendor Advisory |
https://github.com/mantisbt/mantisbt/commit/5fb979604d88c630343b3eaf2b435cd41918c501 | Patch Third Party Advisory |
http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-10-09 13:15
Updated : 2023-01-20 08:34
NVD link : CVE-2019-15715
Mitre link : CVE-2019-15715
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
mantisbt
- mantisbt