Vulnerability Details CVE-2015-1042
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.1%
CVSS Severity
CVSS v2 Score 5.8
Products affected by CVE-2015-1042
-
cpe:2.3:a:mantisbt:mantisbt:1.2.0
-
cpe:2.3:a:mantisbt:mantisbt:1.2.1
-
cpe:2.3:a:mantisbt:mantisbt:1.2.10
-
cpe:2.3:a:mantisbt:mantisbt:1.2.11
-
cpe:2.3:a:mantisbt:mantisbt:1.2.12
-
cpe:2.3:a:mantisbt:mantisbt:1.2.13
-
cpe:2.3:a:mantisbt:mantisbt:1.2.14
-
cpe:2.3:a:mantisbt:mantisbt:1.2.15
-
cpe:2.3:a:mantisbt:mantisbt:1.2.16
-
cpe:2.3:a:mantisbt:mantisbt:1.2.17
-
cpe:2.3:a:mantisbt:mantisbt:1.2.18
-
cpe:2.3:a:mantisbt:mantisbt:1.2.2
-
cpe:2.3:a:mantisbt:mantisbt:1.2.3
-
cpe:2.3:a:mantisbt:mantisbt:1.2.4
-
cpe:2.3:a:mantisbt:mantisbt:1.2.5
-
cpe:2.3:a:mantisbt:mantisbt:1.2.6
-
cpe:2.3:a:mantisbt:mantisbt:1.2.7
-
cpe:2.3:a:mantisbt:mantisbt:1.2.8
-
cpe:2.3:a:mantisbt:mantisbt:1.2.9