Insufficient Access Control in Registration and Password Reset Process Exposes Users to Takeover
CVE-2024-34077
Key Information:
- Vendor
- Mantisbt
- Status
- Mantisbt
- Vendor
- CVE Published:
- 14 May 2024
Summary
MantisBT, the open source issue tracker, suffers from an insufficient access control vulnerability that can be exploited during the password reset process. An attacker can potentially reset the password of another user if there is an incomplete request pending. This exploit is viable only when the verification token is still active, which is typically within 5 minutes after the user opens the confirmation URL sent via email. Additionally, attackers could perform brute-force attempts against the account_update.php script using incrementing user IDs. A successful attack grants complete access to the affected account, exposing sensitive data and functionalities depending on the user's privileges. Users are encouraged to upgrade to version 2.26.2 or implement mitigative strategies such as adjusting the 'TOKEN_EXPIRY_AUTHENTICATED' constant in the configuration file.
Affected Version(s)
mantisbt < 2.26.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved