MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/42043/ | Exploit Third Party Advisory |
http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt | Exploit Third Party Advisory |
https://mantisbt.org/bugs/view.php?id=22816 | Issue Tracking |
https://mantisbt.org/bugs/view.php?id=22702 | Issue Tracking |
http://www.securitytracker.com/id/1038538 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-05-21 07:29
Updated : 2017-07-07 18:29
NVD link : CVE-2017-7620
Mitre link : CVE-2017-7620
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
mantisbt
- mantisbt