CVE-2018-6382
low-risk
Published 2018-01-30
MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass
Do I need to act?
-
0.09% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.3/10
Low
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Vendor Advisory
http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908
Issue Tracking
https://mantisbt.org/bugs/view.php?id=23908
Vendor Advisory
http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908
Issue Tracking
https://mantisbt.org/bugs/view.php?id=23908
18
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal