MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://mantisbt.org/bugs/view.php?id=22816 | issue tracking |
http://www.securitytracker.com/id/1038538 | vdb entry |
https://www.exploit-db.com/exploits/42043/ | third party advisory exploit |
https://mantisbt.org/bugs/view.php?id=22702 | issue tracking |
http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt | third party advisory exploit |