Vulnerabilidad en MantisBT (CVE-2011-3357)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-22
Limitación incorrecta de nombre de ruta a un directorio restringido (Path Traversal)
Fecha de publicación:
21/09/2011
Última modificación:
11/04/2025
Descripción
Vulnerabilidad de salto de directorio en bug_actiongroup_ext_page.php en MantisBT antes de v1.2.8, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través del parámetro .. (punto punto) en el parámetro action, relacionado con bug_actiongroup_page.php.
Impacto
Puntuación base 2.0
6.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:* | 1.2.7 (incluyendo) | |
| cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297
- http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html
- http://secunia.com/advisories/45961
- http://secunia.com/advisories/51199
- http://security.gentoo.org/glsa/glsa-201211-01.xml
- http://securityreason.com/securityalert/8392
- http://www.debian.org/security/2011/dsa-2308
- http://www.mantisbt.org/bugs/view.php?id=13281
- http://www.openwall.com/lists/oss-security/2011/09/04/1
- http://www.openwall.com/lists/oss-security/2011/09/04/2
- http://www.openwall.com/lists/oss-security/2011/09/09/9
- http://www.securityfocus.com/archive/1/519547/100/0/threaded
- http://www.securityfocus.com/bid/49448
- https://bugzilla.redhat.com/show_bug.cgi?id=735514
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69588
- https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d
- https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f
- https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297
- http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html
- http://secunia.com/advisories/45961
- http://secunia.com/advisories/51199
- http://security.gentoo.org/glsa/glsa-201211-01.xml
- http://securityreason.com/securityalert/8392
- http://www.debian.org/security/2011/dsa-2308
- http://www.mantisbt.org/bugs/view.php?id=13281
- http://www.openwall.com/lists/oss-security/2011/09/04/1
- http://www.openwall.com/lists/oss-security/2011/09/04/2
- http://www.openwall.com/lists/oss-security/2011/09/09/9
- http://www.securityfocus.com/archive/1/519547/100/0/threaded
- http://www.securityfocus.com/bid/49448
- https://bugzilla.redhat.com/show_bug.cgi?id=735514
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69588
- https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d
- https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f
- https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html



