Описание
MantisBT Host Header Injection vulnerability
Impact
Knowing a user's email address and username, an unauthenticated attacker can hijack the user's account by poisoning the link in the password reset notification message.
Patches
https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744
Workarounds
Define $g_path as appropriate in config_inc.php.
References
https://mantisbt.org/bugs/view.php?id=19381
Credits
Thanks to the following security researchers for responsibly reporting and helping resolve this vulnerability.
- Pier-Luc Maltais (https://twitter.com/plmaltais)
- Hlib Yavorskyi (https://github.com/Kerkroups)
- Jingshao Chen (https://github.com/shaozi)
- Brandon Roldan
- nhchoudhary
Пакеты
mantisbt/mantisbt
< 2.26.1
2.26.1
Связанные уязвимости
MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.
MantisBT is an open source issue tracker. Prior to version 2.26.1, an ...