
oss-sec mailing list archives
MantisBT - Full admin access vulnerability
From: <7b4xrw+5q6jtt69cnwlw () guerrillamail com>
Date: Sun, 16 Apr 2017 13:08:27 +0000
A vulnerability exists in MantisBT where any users password can be reset: Visiting /verify.php?id=XXX&confirm_hash= where XXX is the userid of the user. id=1 is the default 'administrator' account if it still exists. On a unpatched instance of mantisBT, this will provide a form to enter a new password for a user. This works on any enabled account (including users with admin access) - providing an anonymous user with admin access to the system The issue can be resolved by checking the value of $t_token_confirm_hash is not null in verify.php i.e. changing the code to read: if( $f_confirm_hash !== $t_token_confirm_hash || null === $t_token_confirm_hash ) { trigger_error( ERROR_LOST_PASSWORD_CONFIRM_HASH_INVALID, ERROR ); } ---- Sent using Guerrillamail.com Block or report abuse: https://www.guerrillamail.com//abuse/?a=TlJnSB4FQKEHgRqt0HIWYQDUA8WA19lHxqhOMtz5Bg%3D%3D
Current thread:
- MantisBT - Full admin access vulnerability 7b4xrw+5q6jtt69cnwlw (Apr 16)
- Re: MantisBT - Full admin access vulnerability - CVE-2017-7615 Damien Regad (Apr 16)