MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.
References
| Link | Resource |
|---|---|
| https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528 | Patch Vendor Advisory |
| https://mantisbt.org/bugs/view.php?id=19381 | Exploit Vendor Advisory |
| https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528 | Patch Vendor Advisory |
| https://mantisbt.org/bugs/view.php?id=19381 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-02-20 22:15
Updated : 2024-12-18 18:03
NVD link : CVE-2024-23830
Mitre link : CVE-2024-23830
CVE.ORG link : CVE-2024-23830
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
NVD-CWE-noinfo