Headline
GHSA-v642-mh27-8j6m: MantisBT may disclose project names to unauthorized users
Impact
Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects’ names, by accessing wiki.php with sequentially incremented IDs.
Patches
Patch under development. The vulnerability will be fixed in MantisBT version 2.25.8.
Workarounds
Disable wiki integration ( $g_wiki_enable = OFF;
)
References
- https://mantisbt.org/bugs/view.php?id=32981
Package
composer mantisbt/mantisbt (Composer)
Affected versions
<= 2.25.7
Patched versions
2.25.8
Description
Impact
Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects’ names, by accessing wiki.php with sequentially incremented IDs.
Patches
Patch under development. The vulnerability will be fixed in MantisBT version 2.25.8.
Workarounds
Disable wiki integration ( $g_wiki_enable = OFF;)
References
- https://mantisbt.org/bugs/view.php?id=32981
References
- GHSA-v642-mh27-8j6m
- https://nvd.nist.gov/vuln/detail/CVE-2023-44394
- mantisbt/mantisbt@65c4488
- https://mantisbt.org/bugs/view.php?id=32981
dregad published to mantisbt/mantisbt
Oct 14, 2023
Published to the GitHub Advisory Database
Oct 17, 2023
Reviewed
Oct 17, 2023
Related news
MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`).