MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528 | vendor advisory patch |
https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744 | patch |
https://mantisbt.org/bugs/view.php?id=19381 | vendor advisory exploit |