[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-9117Date: (C)2014-12-09   (M)2023-12-22


MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-62101
BID-71321
DSA-3120
http://www.openwall.com/lists/oss-security/2014/11/26/19
http://www.openwall.com/lists/oss-security/2014/11/27/8
https://github.com/mantisbt/mantisbt/commit/7bb78e45
https://www.mantisbt.org/bugs/view.php?id=17811
mantisbt-cve20149117-sec-bypass(99004)

CPE    1
cpe:/a:mantisbt:mantisbt
CWE    1
CWE-284
OVAL    4
oval:org.secpod.oval:def:108086
oval:org.secpod.oval:def:108089
oval:org.secpod.oval:def:108194
oval:org.secpod.oval:def:601901
...

© SecPod Technologies