CWE
264
Advisory Published
Updated

CVE-2012-5522

First published: Fri Nov 16 2012(Updated: )

MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
CentOS Libreport-plugin-mantisbt<=1.2.11
CentOS Libreport-plugin-mantisbt=0.18.0
CentOS Libreport-plugin-mantisbt=0.19.0
CentOS Libreport-plugin-mantisbt=0.19.0-a1
CentOS Libreport-plugin-mantisbt=0.19.0-a2
CentOS Libreport-plugin-mantisbt=0.19.0-rc1
CentOS Libreport-plugin-mantisbt=0.19.1
CentOS Libreport-plugin-mantisbt=0.19.2
CentOS Libreport-plugin-mantisbt=0.19.3
CentOS Libreport-plugin-mantisbt=0.19.4
CentOS Libreport-plugin-mantisbt=0.19.5
CentOS Libreport-plugin-mantisbt=1.0.0
CentOS Libreport-plugin-mantisbt=1.0.0-a1
CentOS Libreport-plugin-mantisbt=1.0.0-a2
CentOS Libreport-plugin-mantisbt=1.0.0-a3
CentOS Libreport-plugin-mantisbt=1.0.0-rc1
CentOS Libreport-plugin-mantisbt=1.0.0-rc2
CentOS Libreport-plugin-mantisbt=1.0.0-rc3
CentOS Libreport-plugin-mantisbt=1.0.0-rc4
CentOS Libreport-plugin-mantisbt=1.0.0-rc5
CentOS Libreport-plugin-mantisbt=1.0.1
CentOS Libreport-plugin-mantisbt=1.0.2
CentOS Libreport-plugin-mantisbt=1.0.3
CentOS Libreport-plugin-mantisbt=1.0.4
CentOS Libreport-plugin-mantisbt=1.0.5
CentOS Libreport-plugin-mantisbt=1.0.6
CentOS Libreport-plugin-mantisbt=1.0.7
CentOS Libreport-plugin-mantisbt=1.0.8
CentOS Libreport-plugin-mantisbt=1.0.9
CentOS Libreport-plugin-mantisbt=1.1.0
CentOS Libreport-plugin-mantisbt=1.1.0-a1
CentOS Libreport-plugin-mantisbt=1.1.0-a2
CentOS Libreport-plugin-mantisbt=1.1.0-a3
CentOS Libreport-plugin-mantisbt=1.1.0-a4
CentOS Libreport-plugin-mantisbt=1.1.0-rc1
CentOS Libreport-plugin-mantisbt=1.1.0-rc2
CentOS Libreport-plugin-mantisbt=1.1.0-rc3
CentOS Libreport-plugin-mantisbt=1.1.1
CentOS Libreport-plugin-mantisbt=1.1.2
CentOS Libreport-plugin-mantisbt=1.1.3
CentOS Libreport-plugin-mantisbt=1.1.4
CentOS Libreport-plugin-mantisbt=1.1.5
CentOS Libreport-plugin-mantisbt=1.1.6
CentOS Libreport-plugin-mantisbt=1.1.7
CentOS Libreport-plugin-mantisbt=1.1.8
CentOS Libreport-plugin-mantisbt=1.1.9
CentOS Libreport-plugin-mantisbt=1.2.0
CentOS Libreport-plugin-mantisbt=1.2.0-alpha1
CentOS Libreport-plugin-mantisbt=1.2.0-alpha2
CentOS Libreport-plugin-mantisbt=1.2.0-alpha3
CentOS Libreport-plugin-mantisbt=1.2.0-rc1
CentOS Libreport-plugin-mantisbt=1.2.0-rc2
CentOS Libreport-plugin-mantisbt=1.2.1
CentOS Libreport-plugin-mantisbt=1.2.2
CentOS Libreport-plugin-mantisbt=1.2.3
CentOS Libreport-plugin-mantisbt=1.2.4
CentOS Libreport-plugin-mantisbt=1.2.5
CentOS Libreport-plugin-mantisbt=1.2.6
CentOS Libreport-plugin-mantisbt=1.2.7
CentOS Libreport-plugin-mantisbt=1.2.8
CentOS Libreport-plugin-mantisbt=1.2.9
CentOS Libreport-plugin-mantisbt=1.2.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2012-5522?

    CVE-2012-5522 has a medium severity rating due to its ability to allow unauthorized access to modify bug statuses.

  • How do I fix CVE-2012-5522?

    To fix CVE-2012-5522, upgrade to MantisBT version 1.2.12 or later.

  • Who is affected by CVE-2012-5522?

    CVE-2012-5522 affects versions of MantisBT prior to 1.2.12, including several older and beta releases.

  • What type of vulnerability is CVE-2012-5522?

    CVE-2012-5522 is a privilege escalation vulnerability that allows unauthorized users to change bug statuses.

  • Can CVE-2012-5522 be exploited remotely?

    Yes, CVE-2012-5522 can be exploited remotely by authenticated users to bypass access restrictions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203