Skip to content

MantisBT Host Header Injection vulnerability

High
dregad published GHSA-mcqj-7p29-9528 Feb 20, 2024

Package

composer mantisbt (Composer)

Affected versions

<2.26.1

Patched versions

2.26.1

Description

Impact

Knowing a user's email address and username, an unauthenticated attacker can hijack the user's account by poisoning the link in the password reset notification message.

Patches

7055731

Workarounds

Define $g_path as appropriate in config_inc.php.

References

https://mantisbt.org/bugs/view.php?id=19381

Credits

Thanks to the following security researchers for responsibly reporting and helping resolve this vulnerability.

Severity

High
8.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

CVE ID

CVE-2024-23830

Weaknesses

No CWEs

Credits