First published: Wed Oct 22 2008(Updated: )
Mantis before 1.1.3 does not unset the session cookie during logout, which makes it easier for remote attackers to hijack sessions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mentiss Acgv Acgvannu | <=1.1.2 | |
Mentiss Acgv Acgvannu | =0.19.3 | |
Mentiss Acgv Acgvannu | =0.19.4 | |
Mentiss Acgv Acgvannu | =1.0.1 | |
Mentiss Acgv Acgvannu | =1.0.2 | |
Mentiss Acgv Acgvannu | =1.0.3 | |
Mentiss Acgv Acgvannu | =1.0.4 | |
Mentiss Acgv Acgvannu | =1.0.5 | |
Mentiss Acgv Acgvannu | =1.0.6 | |
Mentiss Acgv Acgvannu | =1.0.7 | |
Mentiss Acgv Acgvannu | =1.0.8 | |
Mentiss Acgv Acgvannu | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4689 has a medium severity level, as it allows session hijacking without proper session cookie management during logout.
To fix CVE-2008-4689, upgrade Mantis to version 1.1.3 or later, which addresses the session cookie issue.
CVE-2008-4689 affects Mantis versions up to and including 1.1.2, alongside multiple earlier versions such as 1.0.1 to 1.0.8.
CVE-2008-4689 allows for session hijacking, enabling attackers to gain unauthorized access to active user sessions.
It is not safe to use any version of Mantis before 1.1.3 due to the vulnerability described in CVE-2008-4689.