CVE-2014-9280
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
08/12/2014
Last modified:
12/04/2025
Description
The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:* | 1.2.17 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/oss-sec/2014/q4/864
- http://seclists.org/oss-sec/2014/q4/923
- http://secunia.com/advisories/62101
- http://www.debian.org/security/2015/dsa-3120
- http://www.mantisbt.org/bugs/view.php?id=17875
- http://www.securityfocus.com/bid/71361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99016
- https://github.com/mantisbt/mantisbt/commit/599364b2
- http://seclists.org/oss-sec/2014/q4/864
- http://seclists.org/oss-sec/2014/q4/923
- http://secunia.com/advisories/62101
- http://www.debian.org/security/2015/dsa-3120
- http://www.mantisbt.org/bugs/view.php?id=17875
- http://www.securityfocus.com/bid/71361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99016
- https://github.com/mantisbt/mantisbt/commit/599364b2



