If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
References
| Link | Resource |
|---|---|
| https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory |
| http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List Third Party Advisory |
| http://www.securityfocus.com/bid/100142 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2017-08-05 08:29
Updated : 2017-08-09 12:33
NVD link : CVE-2017-12419
Mitre link : CVE-2017-12419
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
mariadb
- mariadb
mysql
- mysql
mantisbt
- mantisbt


