MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt | Exploit Third Party Advisory |
http://www.securitytracker.com/id/1038538 | |
https://mantisbt.org/bugs/view.php?id=22702 | Issue Tracking |
https://mantisbt.org/bugs/view.php?id=22816 | Issue Tracking |
https://www.exploit-db.com/exploits/42043/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-05-21T14:00:00
Updated: 2017-07-07T09:57:01
Reserved: 2017-04-10T00:00:00
Link: CVE-2017-7620
JSON object: View
NVD Information
Status : Modified
Published: 2017-05-21T14:29:00.180
Modified: 2017-07-08T01:29:17.193
Link: CVE-2017-7620
JSON object: View
Redhat Information
No data.
CWE