First published: Tue Apr 17 2018(Updated: )
### Impact An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. ### Patches Update to 2.13.0 or later ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mautic Mautic | >=1.0.0<=1.4.1 | |
Mautic Mautic | >=2.0.0<2.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10189 is a vulnerability in the Mautic software version 2.x before 2.13.0 that allows a third party to manipulate tracking cookies and assume being tracked.
The impact of CVE-2018-10189 is that a third party can systematically emulate tracking cookies per contact and manipulate the cookie value.
The vulnerability CVE-2018-10189 can be exploited by manipulating the cookie value with +1 to assume being tracked.
To fix the vulnerability CVE-2018-10189, you need to update Mautic to version 2.13.0 or later.
You can find more information about CVE-2018-10189 on the GitHub security advisory page and the NIST National Vulnerability Database.