First published: Sat Dec 06 2014(Updated: )
MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | <=1.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9117 is considered to have a medium severity due to its potential to allow CAPTCHA bypass.
To fix CVE-2014-9117, upgrade MantisBT to version 1.2.18 or later.
The impact of CVE-2014-9117 is that it allows remote attackers to bypass CAPTCHA mechanisms, potentially leading to unauthorized access.
All versions of MantisBT prior to 1.2.18 are affected by CVE-2014-9117.
Yes, CVE-2014-9117 can be easily exploited by anyone who knows the CAPTCHA answer corresponding to the public_key parameter.