fkie_cve-2005-4518
Vulnerability from fkie_nvd
Published
2005-12-28 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Mantis before 0.19.4 allows remote attackers to bypass the file upload size restriction by modifying the max_file_size parameter to (1) bug_file_add.php, (2) bug_report.php, (3) bug_report_advanced_page.php, and (4) proj_doc_add_page.php.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantis:mantis:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "9407F704-FF3C-4976-BE4C-A1DDC16715D0", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "99FB3D29-644D-4E5F-875D-C87CCE3EF95C", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A5173B32-1099-47C9-996B-56DB29456BB9", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6CA26FD-9C45-4628-82B7-E37E3EA3E2A2", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B9B4611-C002-40F5-978C-BB90F1A893C3", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B419B788-ADDD-4C0A-8E02-CBB58FD21938", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C7C8B5A-A630-4EDD-A6E8-27D2E1139CF3", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "B347D6C8-4607-481D-863E-7F41E9868041", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E387645-BC7A-4EA5-AE9E-A3C66994391B", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "4F434D16-4F09-4BCF-BD3E-9114876C2575", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "C80575A3-87E7-40BC-9BCB-E12BB7938A77", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6D8FD23-C9A3-40AB-B3ED-86739BA8A362", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "72BD480B-7CFB-4FD3-8E47-028F32AEF902", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "04989B5F-30B2-43A0-A061-BF43EEA8756C", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC7C781D-F5D1-4C63-B6E3-230DEC80104E", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0755FA0-2365-42B4-8E42-214D5BAD71A1", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "35248DDA-D37D-4D72-9FF8-6813BA4C87BE", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "A67C54F4-4155-43DA-8E07-579249759989", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "9DE7BEF1-1522-4666-B6B1-36A308FBC0A3", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.6:*:*:*:*:*:*:*", "matchCriteriaId": "C376D216-914A-4D96-8603-C6861B3E2857", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.7:*:*:*:*:*:*:*", "matchCriteriaId": "CF0636CA-49A5-4463-B22B-6C5E1E2D44AC", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.8:*:*:*:*:*:*:*", "matchCriteriaId": "E3A07B4C-CE12-4381-BFE4-CE79411F5069", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "DB6E1BE3-BF57-4ED4-918D-8B23CB195ECE", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "065C222C-638F-4303-BE6A-7FED59E21FB9", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB502B29-FBC5-4984-A735-AA0B6DF4A58D", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F759138-7079-471F-B30D-ED62351CFCB9", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "3A62328B-4C77-4FF4-B1D9-BE4A2E5C61FF", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DAFD163-7FE7-48FB-8860-7B00B0FFA628", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "7C074DBE-AFC9-4094-A170-A31D79C139D8", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "53520AA0-E5AB-450A-9D95-E075B552D2E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*", "matchCriteriaId": "4D77F95A-0059-4442-8D9D-AA7F101FBBE5", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "E0BC255D-6B0F-412D-B639-B9F9656E4839", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "70450FAB-7886-418E-B471-8F16A68F9658", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "4B4CFE80-223F-45DA-A9FB-03474F61E027", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "B29FF305-E773-497E-9C47-7D87383F1440", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "8724300D-CBDC-4C66-BF78-038F838C06DF", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "B7283A58-EE8E-493F-8E51-C97FF87ECA16", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*", "matchCriteriaId": "E3CF3162-EAF8-438C-891A-FD13ECF6D6A6", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E42F3A0-5FDB-4053-9EA5-D19B7061CDE8", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "101BF6DC-0F73-41E0-A0EE-BA1EA7397423", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCC458D9-12B1-4CF1-980E-BC86E874BBA2", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18a1:*:*:*:*:*:*:*", "matchCriteriaId": "2202C65A-33FB-4742-8706-2BDD5B442030", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "5419E3AC-4215-4584-9538-AF790DC9BD5F", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "D3C48B8F-633E-4D69-A174-26C19829DE98", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0a:*:*:*:*:*:*:*", "matchCriteriaId": "C1E7658F-A543-46F5-B79D-E0E25B7C574F", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "DD259C18-7111-45C9-B6C3-6A5F29998146", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA3B4B-D7E6-4555-969F-66217ACDACDA", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "38BFDCFA-00C8-4B6A-B758-8FD15A122CA2", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "6770FDC6-792D-49B2-942B-282F9012D0BE", "vulnerable": false }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D8E7458-6655-4C86-85A9-81004FF38321", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mantis before 0.19.4 allows remote attackers to bypass the file upload size restriction by modifying the max_file_size parameter to (1) bug_file_add.php, (2) bug_report.php, (3) bug_report_advanced_page.php, and (4) proj_doc_add_page.php." } ], "id": "CVE-2005-4518", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-28T01:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/18181/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/18221" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18481" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/project/shownotes.php?release_id=377932\u0026group_id=14963" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-944" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22056" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/16046/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.trapkit.de/advisories/TKADV2005-11-002.txt" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/3064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/18181/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/18221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/project/shownotes.php?release_id=377932\u0026group_id=14963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/16046/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.trapkit.de/advisories/TKADV2005-11-002.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/3064" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…