View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0036995 | mantisbt | security | public | 2026-03-26 00:24 | 2026-05-09 19:56 |
| Reporter | dracosectech | Assigned To | dregad | ||
| Priority | normal | Severity | minor | Reproducibility | always |
| Status | closed | Resolution | fixed | ||
| Target Version | 2.28.2 | Fixed in Version | 2.28.2 | ||
| Summary | 0036995: CVE-2026-34390: Privilege Escalation from Manager to Administrator role per project basis | ||||
| Description | Any users with access level "Manager" can grant any users to access level "Administrator" in any projects they have Manager access to, due to missing validation for the user provided input Affected endpoints are:
========================================================= In the back-end, although method Vulnerable Code Fragment:
PatchWe can patch this vulnerability by validating the user-controlled | ||||
| Steps To Reproduce | To reproduce this vulnerability, we can:
Where the
| ||||
| Additional Information | Credits: Dracosec Research Limited - Siunam Tang (siunamtang@dracosec.tech), Chris Chan (chrischan@dracosec.tech), Krecendo Hui (krecendohui@dracosec.tech), and William Lam (williamlam@dracosec.tech) | ||||
| Tags | No tags attached. | ||||
| Attached Files | |||||
|
Hello, Thanks for the comprehensive bug report, I confirm the vulnerability, both from GUI and API. Next steps: I will open an Advisory on GitHub, request a CVE, and test your proposed patch. For credits, please let me know if I should also mention your company, or just the individual names ? |
|
|
Hi Dregad, Thank you for the update and for confirming the vulnerability. |
|
|
After in-depth analysis, it appears that the vulnerability exists since the original implementation of this feature, over 20 years ago. It was introduced in the REST API with the ProjectUsersAdd Command, via commit MantisBT master 9ee5e17d in MantisBT 2.26.0, which added the ability to manage Project users (see 0032466). It's worth mentioning that the vulnerability is effectively not as bad as it may sound, because having escalated administrator privilege at Project level is effectively not very different from being manager - in particular it does not let the upgraded user delete the Project or grant them any access to global administrative functions such as managing Users, Projects, Plugins, Custom Fields, etc. I created Advisory https://github.com/mantisbt/mantisbt/security/advisories/GHSA-frf7-jhp9-jxm6, and requested assignment of a CVE ID. Thanks for proposing a patch. However, please note that it does not cover all cases, due to use of access_get_global_level() function, instead of the more restrictive access_get_project_level() which should be used in this context. |
|
|
CVE-2026-34390 assigned. |
|
|
MantisBT: master-2.28 69e0180f 2026-03-27 13:53 Details Diff |
Fix privilege escalation in ProjectUsersAddCommand Prevents MANAGER users from upgrading themselves or other users to project-level ADMINISTRATOR. Fixes 0036995 |
Affected Issues 0036995 |
|
| mod - core/commands/ProjectUsersAddCommand.php | Diff File | ||
|
MantisBT: master-2.28 b1c3430b 2026-05-08 04:05 Details Diff |
Revert "Cannot grant an access level higher than one's own" This reverts commit 86accbca671a6a2bfe2204e58739b58d4f06b63d. The vulnerability, identified in Issue 0037002, had in fact already been reported (and fixed) in Issue 0036995, see commit 69e0180f180ed5acf48a8d281a73683a7bf32461. |
Affected Issues 0036995, 0037002 |
|
| mod - core/commands/ProjectUsersAddCommand.php | Diff File | ||