
CVE-2021-43257
https://notcve.org/view.php?id=CVE-2021-43257
14 Apr 2022 — Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel. Una falta de neutralización de elementos de fórmula en la API CSV de MantisBT versiones anteriores a 2.25.3 permite que un atacante no privilegiado ejecute código u obtenga acceso a información cuando un usuario abre el archivo CSV generado por csv_export.php en Excel • https://github.com/mantisbt/mantisbt/commit/7f4534c723e3162b8784aebda4836324041dbc3e • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVE-2022-26144
https://notcve.org/view.php?id=CVE-2022-26144
13 Apr 2022 — An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed. Se ha detectado un problema de tipo XSS en MantisBT versiones anteriores a 2.25.3. Un escape inapropiado del nombre de un plugin permite una ejecución de código arbitrario (si CSP lo permite) en los archivos manage_plugin_page.php y manage_plugin_uninstall.php cuando es ins... • https://mantisbt.org/bugs/view.php?id=29688 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-33557
https://notcve.org/view.php?id=CVE-2021-33557
17 Jun 2021 — An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field. Se ha detectado un problema de tipo XSS en el archivo manage_custom_field_edit_page.php en MantisBT versiones anteriores a 2.25.2. La salida sin escape del parámetro return permite a un atacante inyectar código en un campo hidden input • https://mantisbt.org/blog/archives/mantisbt/699 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2009-20001
https://notcve.org/view.php?id=CVE-2009-20001
07 Mar 2021 — An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them. Se detectó un problema en MantisBT versiones anteriores a 2.24.5. Asocia una cadena de cookies única con cada usuario. • https://mantisbt.org/bugs/view.php?id=11296 • CWE-613: Insufficient Session Expiration •

CVE-2020-35571
https://notcve.org/view.php?id=CVE-2020-35571
22 Feb 2021 — An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings. Se detectó un problema en MantisBT versiones hasta 2.24.3. En la llamada de helper_ensure_confirmed en el archivo manage_custom_field_update.php, el nombre del campo personalizado no es saneado. • https://mantisbt.org/bugs/view.php?id=27768 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-29604
https://notcve.org/view.php?id=CVE-2020-29604
29 Jan 2021 — An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information. Se detectó un problema en MantisBT versiones anteriores a 2.24.4. Una falta d... • https://mantisbt.org/bugs/view.php?id=27357 • CWE-862: Missing Authorization •

CVE-2020-29605
https://notcve.org/view.php?id=CVE-2020-29605
29 Jan 2021 — An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.) Se detectó un problema en MantisBT versiones anteriores a 2.24.4. Debido a unas comprobaciones de nivel de acceso insuficientes, cualquier usuario que haya iniciado ses... • https://mantisbt.org/bugs/view.php?id=27357 • CWE-863: Incorrect Authorization •

CVE-2020-29603
https://notcve.org/view.php?id=CVE-2020-29603
29 Jan 2021 — In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects' names via the manage_proj_edit_page.php project_id parameter, without having access to them. En el archivo manage_proj_edit_page.php en MantisBT versiones anteriores a 2.24.4, cualquier usuario que haya iniciado sesión sin privilegios puede recuperar los nombres de los Proyectos Privados por medio del parámetro project_id del archivo manage_proj_edit_page.php, sin tener acceso a ellos • https://mantisbt.org/bugs/view.php?id=27357 • CWE-922: Insecure Storage of Sensitive Information •

CVE-2020-36192
https://notcve.org/view.php?id=CVE-2020-36192
18 Jan 2021 — An issue was discovered in the Source Integration plugin before 2.4.1 for MantisBT. An attacker can gain access to the Summary field of private Issues (either marked as Private, or part of a private Project), if they are attached to an existing Changeset. The information is visible on the view.php page, as well as on the list.php page (a pop-up on the Affected Issues id hyperlink). Additionally, if the attacker has "Update threshold" in the plugin's configuration (set to the "updater" access level by defaul... • https://github.com/mantisbt-plugins/source-integration/issues/344 •

CVE-2020-28413 – Mantis Bug Tracker 2.24.3 - 'access' SQL Injection
https://notcve.org/view.php?id=CVE-2020-28413
30 Dec 2020 — In MantisBT 2.24.3, SQL Injection can occur in the parameter "access" of the mc_project_get_users function through the API SOAP. En MantisBT versión 2.24.3, una Inyección SQL puede ocurrir en el parámetro "access" de la función mc_project_get_users por medio de la API SOAP. Mantis Bug Tracker version 2.24.3 suffers from a remote SQL injection vulnerability. • https://packetstorm.news/files/id/160750 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •