Lucene search

K
githubGitHub Advisory DatabaseGHSA-MCQJ-7P29-9528
HistoryFeb 20, 2024 - 11:43 p.m.

MantisBT Host Header Injection vulnerability

2024-02-2023:43:17
CWE-74
GitHub Advisory Database
github.com
14
mantisbt
host header injection
user account hijack
vulnerability
security researchers
patch
workarounds
email address
username
password reset
notification message
github
configuration
security references

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

15.5%

Impact

Knowing a user’s email address and username, an unauthenticated attacker can hijack the user’s account by poisoning the link in the password reset notification message.

Patches

https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744

Workarounds

Define $g_path as appropriate in config_inc.php.

References

https://mantisbt.org/bugs/view.php?id=19381

Credits

Thanks to the following security researchers for responsibly reporting and helping resolve this vulnerability.

Affected configurations

Vulners
Node
mantisbtmantisbtRange<2.26.1
VendorProductVersionCPE
mantisbtmantisbt*cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

15.5%