CVE-2015-1042
The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.Enginsight
Vendor | Product | Version |
---|---|---|
mantisbt | mantisbt | 1.2.0 |
mantisbt | mantisbt | 1.2.0 |
mantisbt | mantisbt | 1.2.0 |
mantisbt | mantisbt | 1.2.1 |
mantisbt | mantisbt | 1.2.2 |
mantisbt | mantisbt | 1.2.3 |
mantisbt | mantisbt | 1.2.4 |
mantisbt | mantisbt | 1.2.5 |
mantisbt | mantisbt | 1.2.6 |
mantisbt | mantisbt | 1.2.7 |
mantisbt | mantisbt | 1.2.8 |
mantisbt | mantisbt | 1.2.9 |
mantisbt | mantisbt | 1.2.10 |
mantisbt | mantisbt | 1.2.11 |
mantisbt | mantisbt | 1.2.12 |
mantisbt | mantisbt | 1.2.13 |
mantisbt | mantisbt | 1.2.14 |
mantisbt | mantisbt | 1.2.15 |
mantisbt | mantisbt | 1.2.16 |
mantisbt | mantisbt | 1.2.17 |
mantisbt | mantisbt | 1.2.18 |