First published: Fri Jun 29 2012(Updated: )
The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | <=1.2.8 | |
CentOS Libreport-plugin-mantisbt | =0.18.0 | |
CentOS Libreport-plugin-mantisbt | =0.19.0 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-a1 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-a2 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =0.19.1 | |
CentOS Libreport-plugin-mantisbt | =0.19.2 | |
CentOS Libreport-plugin-mantisbt | =0.19.3 | |
CentOS Libreport-plugin-mantisbt | =0.19.4 | |
CentOS Libreport-plugin-mantisbt | =0.19.5 | |
CentOS Libreport-plugin-mantisbt | =1.0.0 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-a1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-a2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-a3 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc3 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc4 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc5 | |
CentOS Libreport-plugin-mantisbt | =1.0.1 | |
CentOS Libreport-plugin-mantisbt | =1.0.2 | |
CentOS Libreport-plugin-mantisbt | =1.0.3 | |
CentOS Libreport-plugin-mantisbt | =1.0.4 | |
CentOS Libreport-plugin-mantisbt | =1.0.5 | |
CentOS Libreport-plugin-mantisbt | =1.0.6 | |
CentOS Libreport-plugin-mantisbt | =1.0.7 | |
CentOS Libreport-plugin-mantisbt | =1.0.8 | |
CentOS Libreport-plugin-mantisbt | =1.0.9 | |
CentOS Libreport-plugin-mantisbt | =1.1.0 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a1 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a2 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a3 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-a4 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.1.0-rc3 | |
CentOS Libreport-plugin-mantisbt | =1.1.1 | |
CentOS Libreport-plugin-mantisbt | =1.1.2 | |
CentOS Libreport-plugin-mantisbt | =1.1.3 | |
CentOS Libreport-plugin-mantisbt | =1.1.4 | |
CentOS Libreport-plugin-mantisbt | =1.1.5 | |
CentOS Libreport-plugin-mantisbt | =1.1.6 | |
CentOS Libreport-plugin-mantisbt | =1.1.7 | |
CentOS Libreport-plugin-mantisbt | =1.1.8 | |
CentOS Libreport-plugin-mantisbt | =1.1.9 | |
CentOS Libreport-plugin-mantisbt | =1.2.0 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-alpha1 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-alpha2 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-alpha3 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.2.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.2.1 | |
CentOS Libreport-plugin-mantisbt | =1.2.2 | |
CentOS Libreport-plugin-mantisbt | =1.2.3 | |
CentOS Libreport-plugin-mantisbt | =1.2.4 | |
CentOS Libreport-plugin-mantisbt | =1.2.5 | |
CentOS Libreport-plugin-mantisbt | =1.2.6 | |
CentOS Libreport-plugin-mantisbt | =1.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1123 is classified as a high severity vulnerability due to its potential to allow remote attackers to bypass authentication.
To fix CVE-2012-1123, upgrade MantisBT to version 1.2.9 or later, which addresses this authentication bypass issue.
CVE-2012-1123 affects all versions of MantisBT prior to 1.2.9, including versions from 0.18.0 through 1.2.8.
Yes, CVE-2012-1123 can lead to unauthorized access by allowing attackers to authenticate without valid credentials.
There is no official workaround for CVE-2012-1123; updating to a fixed version is the recommended course of action.