Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2012-2691 CVE-2012-2692 |
CWE-ID | CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
MantisBT Web applications / Other software |
Vendor | mantisbt.sourceforge.net |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU43977
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2012-2691
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request.
MitigationInstall update from vendor's website.
Vulnerable software versionsMantisBT: 0.18.0 - 1.2.9
CPE2.3https://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html
https://secunia.com/advisories/49414
https://secunia.com/advisories/51199
https://security.gentoo.org/glsa/glsa-201211-01.xml
https://www.mantisbt.org/bugs/changelog_page.php?version_id=148
https://www.mantisbt.org/bugs/view.php?id=14340
https://www.openwall.com/lists/oss-security/2012/06/09/1
https://www.openwall.com/lists/oss-security/2012/06/11/6
https://www.securityfocus.com/bid/53907
https://www.securityfocus.com/bid/56467
https://exchange.xforce.ibmcloud.com/vulnerabilities/76180
https://github.com/mantisbt/mantisbt/commit/175d973105fe9f03a37ced537b742611631067e0
https://github.com/mantisbt/mantisbt/commit/edc8142bb8ac0ac0df1a3824d78c15f4015d959e
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU43978
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2012-2692
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote #AU# to manipulate or delete data.
MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments.
MitigationInstall update from vendor's website.
Vulnerable software versionsMantisBT: 0.18.0 - 1.2.9
CPE2.3https://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html
https://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html
https://secunia.com/advisories/51199
https://security.gentoo.org/glsa/glsa-201211-01.xml
https://www.mantisbt.org/bugs/changelog_page.php?version_id=148
https://www.mantisbt.org/bugs/view.php?id=14016
https://www.openwall.com/lists/oss-security/2012/06/09/1
https://www.openwall.com/lists/oss-security/2012/06/11/6
https://www.securityfocus.com/bid/53921
https://github.com/mantisbt/mantisbt/commit/ceafe6f0c679411b81368052633a63dd3ca06d9c
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.