First published: Thu Jun 06 2019(Updated: )
An issue was discovered in MantisBT through 1.3.14, and 2.0.0. Using a crafted request on bug_report_page.php (modifying the 'm_id' parameter), any user with REPORTER access or above is able to view any private issue's details (summary, description, steps to reproduce, additional information) when cloning it. By checking the 'Copy issue notes' and 'Copy attachments' checkboxes and completing the clone operation, this data also becomes public (except private notes).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mantisbt Mantisbt | <=1.3.14 | |
Mantisbt Mantisbt | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-9839 is medium, with a severity score of 6.5.
An attacker can exploit CVE-2018-9839 by using a crafted request on bug_report_page.php to modify the 'm_id' parameter and view private issue details.
MantisBT versions 1.3.14 and 2.0.0 are affected by CVE-2018-9839.
To fix CVE-2018-9839, you should upgrade MantisBT to a version higher than 2.0.0 or apply the necessary patches provided by the vendor.
More information about CVE-2018-9839 can be found in the references: https://github.com/mantisbt/mantisbt/commit/1fbcd9bca2f2c77cb61624d36ddee4b3802c38ea and https://mantisbt.org/bugs/view.php?id=24221.