MantisBT 2.24.4 Released

In order to stay up to date with the latest MantisBT news, please star our GitHub repository, join our Gitter channel, or follow us on X or Mastodon and retweet to spread the word!

MantisBT 2.24.4

Security and maintenance release, addressing 6 CVEs: an XSS issue, an SQL injection in the SOAP API and several information disclosure issues including a critical one allowing full access to private issues’ contents. All installations are strongly advised to upgrade as soon as possible.

This release also includes a few PHP 8.0 compatibility fixes, including a major one causing an access denied error for all users when updating issues.

  • 0020690: [bugtracker] inconsistent UI for view bugnote revision (dregad)
  • 0026794: [security] User Account – Takeover (dregad)
  • 0027363: [security] Fixed in version can be changed to a version that doesn’t exist (dregad)
  • 0027350: [security] When updating an issue, a Viewer user can be set as Reporter (dregad)
  • 0027357: [security] Attacker can leak private information via different functionality (dregad)
  • 0027728: [security] CVE-2020-29604: Full disclosure of private issue contents, including bugnotes and attachments (dregad)
  • 0027727: [security] CVE-2020-29605: Disclosure of private issue summary (dregad)
  • 0027726: [security] CVE-2020-29603: Disclosure of private project name (dregad)
  • 0027361: [security] Private category can be access/used by a non member of a private project (IDOR) (dregad)
  • 0027370: [security] CVE-2020-35849: Revisions allow viewing private bugnotes id and summary (dregad)
  • 0027495: [security] CVE-2020-28413: SQL injection in the parameter “access” on the mc_project_get_users function throught the API SOAP. (dregad) 0027704: [javascript] Javascript error in View Issues page (dregad)
  • 0027779: [security] CVE-2020-35571: XSS in helper_ensure_confirmed() calls (dregad)
  • 0027464: [printing] print_manage_user_sort_link Function Parameter Required after Optional (atrol)
  • 0027465: [code cleanup] Declaring a required parameter after an optional one is deprecated in PHP 8 (atrol)
  • 0027799: [bugtracker] Adapt Error handler to PHP 8 (dregad)
  • 0027806: [bugtracker] Impossible to edit issues with PHP8 (dregad)
  • 0027444: [security] Printing unsanitized user input in install.php (atrol)

Many thanks to randomdhiraj, ethicalhcop and d3vpoo1, for identifying and responsibly reporting these security issues.

Go ahead and download the release from our website.

MantisBT 2.24.3 Released

In order to stay up to date with the latest MantisBT news, please star our GitHub repository, join our Gitter channel, or follow us on X or Mastodon and retweet to spread the word!

MantisBT 2.24.3

Security release for 2.24.x series. All installations are strongly advised to upgrade as soon as possible.

  • 0027039: [security] CVE-2020-25781: Access to private bug note attachments (dregad)
  • 0027268: [security] Admin can get issues assigned to users not allowed to handle them (dregad)
  • 0027275: [security] CVE-2020-25288: HTML Injection on bug_update_page.php (dregad)
  • 0027276: [security] Send reminder to viewer (dregad)
  • 0027283: [security] Admin can set viewer as a tag creator (dregad)
  • 0027284: [plug-ins] Priority can override to any positive integer (dregad)
  • 0027299: [code cleanup] Remove code duplication in File API (dregad)
  • 0027303: [code cleanup] When processing categories, it is not necessary to know the project id (dregad)
  • 0027304: [security] CVE-2020-25830: HTML Injection in bug_actiongroup_page.php (dregad)

Many thanks to d3vpoo1 who identified most of the security issues fixed in this release.

Go ahead and download the release from our website.

MantisBT Security releases 1.3.8, 2.1.2 and 2.2.2

Maintenance releases including security fixes for Cross-Site Scripting (XSS) issues have just been released. We advise all installations to upgrade; releases can be downloaded from our website.

Patched vulnerabilities:

  • 22537: CVE-2017-6973 – XSS in adm_config_report.php (affects 1.3.0-rc.2 and later)

Additionally, version 2.1.1 also includes fixes previously released in 1.3.7 and 2.2.1:

  • 22486: CVE-2017-6797 – XSS in bug_change_status_page.php
  • 22497: CVE-2017-6799 – XSS in view_filters_page.php