First published: Sat Aug 05 2017(Updated: )
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | =2.5.2 | |
MariaDB | ||
MySQL (MySQL-common) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12419 has a medium severity level due to the potential unauthorized access if the 'admin' directory is not removed after installation.
To fix CVE-2017-12419, remove the 'admin' directory as recommended in the MantisBT Admin Guide.
CVE-2017-12419 affects MantisBT version 2.5.2.
If exploited, CVE-2017-12419 could allow attackers to access sensitive administrative features of the MantisBT application.
Yes, the local_infile setting being enabled in the MySQL client can contribute to the risk associated with CVE-2017-12419.