Show plain JSON{"id": "CVE-2011-3357", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-09-21T16:55:05.117", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297", "tags": ["Exploit", "Patch"], "source": "secalert@redhat.com"}, {"url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/45961", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/51199", "source": "secalert@redhat.com"}, {"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", "source": "secalert@redhat.com"}, {"url": "http://securityreason.com/securityalert/8392", "source": "secalert@redhat.com"}, {"url": "http://www.debian.org/security/2011/dsa-2308", "source": "secalert@redhat.com"}, {"url": "http://www.mantisbt.org/bugs/view.php?id=13281", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2011/09/04/1", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2011/09/04/2", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2011/09/09/9", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/49448", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514", "tags": ["Exploit", "Patch"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588", "source": "secalert@redhat.com"}, {"url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html", "tags": ["Exploit"], "source": "secalert@redhat.com"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/45961", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/51199", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8392", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2011/dsa-2308", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mantisbt.org/bugs/view.php?id=13281", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2011/09/04/1", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2011/09/04/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2011/09/09/9", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/519547/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/49448", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735514", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69588", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en bug_actiongroup_ext_page.php en MantisBT antes de v1.2.8, permite a atacantes remotos incluir y ejecutar archivos locales de su elecci\u00f3n a trav\u00e9s del par\u00e1metro .. (punto punto) en el par\u00e1metro action, relacionado con bug_actiongroup_page.php."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E421063A-47DD-4307-AB38-331301A1DC6C", "versionEndIncluding": "1.2.7"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85A3FBD5-163C-4990-B809-A5C9C81A3C6C"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3FDF456-9648-4A7C-B15A-2828A32D4962"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B2602F7-2D93-4E1E-9425-4EDD23752029"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86DE3BE3-D6C9-4905-9E61-B70776460604"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F128A2E2-D509-4B50-95C2-1A31C5B3B31F"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "140D5F68-1CAB-458C-BC8B-4F726D657FE8"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D25F4F5-7678-41C1-93CB-305883A08527"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1A1316D-314B-4740-A836-D5E6319F4B28"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBD27CCE-28C4-43CC-8CBD-D7FFB46171AC"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97298C43-B881-4C11-ADB6-17A8E43EB84E"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7257ADD7-C9B7-4F85-AA13-615DD033FD5C"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02FE950B-5E29-4FAA-9BE5-79F38B4C38F7"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6F2BA78-D054-4E49-ABCA-637922898BF7"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4595B1E3-25AB-489E-A847-FDBF2554DD6D"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11A8F17-5253-475B-89FF-A26EA7531E13"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A88B09D-CDCF-45FD-B004-13B597DA4F48"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49583BE8-B832-4E9F-B154-47A26C72489D"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2501F40-3630-4528-BE0A-61D4BB6EC7FE"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9223DAF7-D03E-4A4E-8AB5-5CEB87DFF2C3"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFF77ABF-0A03-437A-B241-1EF2BBB83D24"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F096CD6-534E-4ABF-B2DF-D4B55B8C5F6A"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66AB537-6FBA-4A51-B10C-BF61F54BC01B"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A50835BF-D28B-47FF-81F0-C34D95D6F2E9"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA0EB9A6-1DFD-4C17-A002-0899DA252A56"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA33285-3EE7-43FD-8347-E7D9A18DC134"}, {"criteria": "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8827C2B4-EBEC-4D64-9AC8-07A048467F40"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}