Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
4.3 |
|
AV:N/AC:M/Au:N/C:N/I:P/A:N |
[email protected] |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 26172
Date de publication : 2005-08-18 22h00 +00:00
Auteur : anonymous
EDB Vérifié : Yes
source: https://www.securityfocus.com/bid/14604/info
Mantis is prone to multiple input validation vulnerabilities. These issues involve cross-site scripting, HTML injection and variable poisoning, and are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage the cross-site scripting issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Successful exploitation of the HTML injection issue could result in having attacker-supplied HTML and script code executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.
The variable poisoning issue could result in unauthorized access and denial of service attacks.
A - Cross Site Scripting Vulnerabilities
http://www.example.com/view_all_set.php?sort=severity&dir="><script>alert(document.cookie)</script>&type=2
B.- Database scanner via variable poisoning
http://www.example.com/core/database_api.php?g_db_type=mysql://invaliduser@localhost:3336
http://www.example.com/core/database_api.php?g_db_type=mysql://root@localhost:3336
http://www.example.com/core/database_api.php?g_db_type=informix://localhost:8080
http://www.example.com/core/database_api.php?g_db_type=mysql://
[email protected]
Products Mentioned
Configuraton 0
Mantis>>Mantis >> Version 0.19.0
Mantis>>Mantis >> Version 0.19.0_rc1
Mantis>>Mantis >> Version 0.19.0a1
Mantis>>Mantis >> Version 0.19.0a2
Mantis>>Mantis >> Version 0.19.1
Mantis>>Mantis >> Version 0.19.2
Mantis>>Mantis >> Version 1.0.0a1
Mantis>>Mantis >> Version 1.0.0a2
Mantis>>Mantis >> Version 1.0.0a3
Configuraton 0
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Debian>>Debian_linux >> Version 3.1
Gentoo>>Linux >> Version *
Références