MantisBT (Mantis Bug Tracker) is an open source issue tracker. Insufficient access control in the registration and password reset process allows an attacker to reset another user's password and takeover their account, if the victim has an incomplete request pending. The exploit is only possible while the verification token is valid, i.e for 5 minutes after the confirmation URL sent by e-mail has been opened, and the user did not complete the process by updating their password. A brute-force attack calling account_update.php with increasing user IDs is possible. A successful takeover would grant the attacker full access to the compromised account, including sensitive information and functionalities associated with the account, the extent of which depends on its privileges and the data it has access to. Version 2.26.2 contains a patch for the issue. As a workaround, one may mitigate the risk by reducing the verification token's validity (change the value of the `TOKEN_EXPIRY_AUTHENTICATED` constant in `constants_inc.php`).
History

Thu, 16 Jan 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Mantisbt
Mantisbt mantisbt
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
Vendors & Products Mantisbt
Mantisbt mantisbt

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T02:42:59.849Z

Reserved: 2024-04-30T06:56:33.383Z

Link: CVE-2024-34077

cve-icon Vulnrichment

Updated: 2024-08-02T02:42:59.849Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-14T15:38:28.583

Modified: 2025-01-16T16:40:04.230

Link: CVE-2024-34077

cve-icon Redhat

No data.