First published: Tue Feb 20 2024(Updated: )
### Impact Knowing a user's email address and username, an unauthenticated attacker can hijack the user's account by poisoning the link in the password reset notification message. ### Patches https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744 ### Workarounds Define `$g_path` as appropriate in config_inc.php. ### References https://mantisbt.org/bugs/view.php?id=19381 ### Credits Thanks to the following security researchers for responsibly reporting and helping resolve this vulnerability. - Pier-Luc Maltais (https://twitter.com/plmaltais) - Hlib Yavorskyi (https://github.com/Kerkroups) - Jingshao Chen (https://github.com/shaozi) - Brandon Roldan - nhchoudhary
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mantisbt/mantisbt | <2.26.1 | 2.26.1 |
CentOS Libreport-plugin-mantisbt | <2.26.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23830 is considered to be a high severity vulnerability due to the potential for account hijacking.
To fix CVE-2024-23830, upgrade to MantisBT version 2.26.1 or later.
An attacker can perform account hijacking by exploiting the password reset process.
Users of MantisBT versions prior to 2.26.1 are affected by this vulnerability.
CVE-2024-23830 is a remote vulnerability, as it can be exploited by unauthenticated attackers.