Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4v8w-gg5j-ph37

Опубликовано: 03 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.8
CVSS3: 9.1

Описание

MantisBT vulnerable to authentication bypass for some passwords due to PHP type juggling

Due to an incorrect use of loose (==) instead of strict (===) comparison in the authentication code, PHP type juggling will cause interpretation of certain MD5 hashes as numbers, specifically those matching scientific notation.

Impact

On MantisBT instances configured to use the MD5 login method, user accounts having a password hash evaluating to zero (i.e. matching regex ^0+[Ee][0-9]+$) are vulnerable, allowing an attacker knowing the victim's username to login without knowledge of their actual password, using any other password having a hash evaluating to zero, for example comito5 (0e579603064547166083907005281618).

No password bruteforcing for individual users is needed, thus $g_max_failed_login_count does not protect against the attack.

Patches

Fixed in 2.27.2.

Workarounds

Check the database for vulnerable accounts, and change those users' passwords, e.g. for MySQL:

SELECT username, email FROM mantis_user_table WHERE password REGEXP '^0+[Ee][0-9]+$'

Credits

Thanks to Harry Sintonen / Reversec for discovering and reporting the issue.

Пакеты

Наименование

mantisbt/mantisbt

composer
Затронутые версииВерсия исправления

< 2.27.2

2.27.2

EPSS

Процентиль: 25%
0.00088
Низкий

8.8 High

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-305
CWE-697

Связанные уязвимости

CVSS3: 9.1
nvd
3 месяца назад

Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.

CVSS3: 9.1
debian
3 месяца назад

Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to ...

EPSS

Процентиль: 25%
0.00088
Низкий

8.8 High

CVSS4

9.1 Critical

CVSS3

Дефекты

CWE-305
CWE-697