Lucene search

K
osvGoogleOSV:GHSA-MCQJ-7P29-9528
HistoryFeb 20, 2024 - 11:43 p.m.

MantisBT Host Header Injection vulnerability

2024-02-2023:43:17
Google
osv.dev
7
mantisbt
host header injection
account hijack
password reset
vulnerability
security researchers

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

AI Score

7.5

Confidence

Low

EPSS

0

Percentile

15.5%

Impact

Knowing a user’s email address and username, an unauthenticated attacker can hijack the user’s account by poisoning the link in the password reset notification message.

Patches

https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744

Workarounds

Define $g_path as appropriate in config_inc.php.

References

https://mantisbt.org/bugs/view.php?id=19381

Credits

Thanks to the following security researchers for responsibly reporting and helping resolve this vulnerability.

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

AI Score

7.5

Confidence

Low

EPSS

0

Percentile

15.5%