First published: Sun May 21 2017(Updated: )
MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | <=1.3.10 | |
CentOS Libreport-plugin-mantisbt | =2.0.0 | |
CentOS Libreport-plugin-mantisbt | =2.0.1 | |
CentOS Libreport-plugin-mantisbt | =2.1.0 | |
CentOS Libreport-plugin-mantisbt | =2.1.1 | |
CentOS Libreport-plugin-mantisbt | =2.1.2 | |
CentOS Libreport-plugin-mantisbt | =2.2.0 | |
CentOS Libreport-plugin-mantisbt | =2.2.2 | |
CentOS Libreport-plugin-mantisbt | =2.2.3 | |
CentOS Libreport-plugin-mantisbt | =2.2.4 | |
CentOS Libreport-plugin-mantisbt | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7620 is considered a medium severity vulnerability.
To fix CVE-2017-7620, upgrade MantisBT to version 1.3.11 or 2.3.3 and later.
CVE-2017-7620 affects MantisBT versions before 1.3.11 and 2.x versions before 2.3.3 and 2.4.x before 2.4.1.
CVE-2017-7620 allows for arbitrary permalink injection via a cross-site request forgery (CSRF) attack.
There are no recommended workarounds for CVE-2017-7620; upgrading is the only effective solution.