Mantis Cross-Site Request Forgery Vulnerabilities

medium Nessus Network Monitor Plugin ID 4506

Synopsis

The remote web server contains a PHP application that is affected by multiple cross-site request forgery vulnerabilities.

Description

The version of Mantis Bug Tracker installed on the remote host does not verify the validity of HTTP requests before performing various administrative actions. If a remote attacker can trick a logged-in administrator into viewing a specially-crafted page, he can leverage this issue to launch cross-site request forgery attacks against the affected application, such as creating additional users with administrator privileges.

Solution

Upgrade to Mantis 1.2.0a1 or later.

See Also

http://www.attrition.org/pipermail/vim/2008-May/001980.html

http://mantisbt.svn.sourceforge.net/viewvc/mantisbt?view=rev&revision=5132

http://www.mantisbt.org/blog/?p=19

http://www.mantisbt.org/bugs/view.php?id=8995

Plugin Details

Severity: Medium

ID: 4506

Family: CGI

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 32324

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Reference Information

CVE: CVE-2008-2276