First published: Mon Oct 16 2023(Updated: )
### Impact Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. ### Patches Patch under development. The vulnerability will be fixed in MantisBT version 2.25.8. ### Workarounds Disable wiki integration ( `$g_wiki_enable = OFF;`) ### References - https://mantisbt.org/bugs/view.php?id=32981
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mantisbt Mantisbt | <2.25.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names.
The vulnerability can be exploited by accessing wiki.php with sequentially incremented IDs.
A patch is currently under development and the vulnerability will be fixed in MantisBT version 2.25.8.
There are no specific workarounds mentioned for this vulnerability.
The severity of CVE-2023-44394 is medium with a CVSS score of 4.3.