Authentication Bypass Affecting mantisbt/mantisbt package, versions <2.26.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-MANTISBTMANTISBT-6258887
  • published21 Feb 2024
  • disclosed20 Feb 2024
  • creditHlib Yavorskyi, plmaltais

Introduced: 20 Feb 2024

CVE-2024-23830  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

Upgrade mantisbt/mantisbt to version 2.26.1 or higher.

Overview

mantisbt/mantisbt is a mantis bug tracker.

Affected versions of this package are vulnerable to Authentication Bypass via the Host Header. Knowing a user's email address and username, an unauthenticated attacker can hijack the user's account by poisoning the link in the password reset notification message.

Workaround

This vulnerability can be mitigated by appropriately defining $g_path in config_inc.php.

References

CVSS Scores

version 3.1