Description
MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
Exploits (1)
References (5)
Core 5
Core References
Issue Tracking x_refsource_confirm
https://mantisbt.org/bugs/view.php?id=22816
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1038538
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/42043/
Issue Tracking x_refsource_confirm
https://mantisbt.org/bugs/view.php?id=22702
Exploit, Third Party Advisory x_refsource_misc
http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt
Scores
CVSS v3
6.5
EPSS
0.0032
EPSS Percentile
55.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Details
CWE
CWE-352
Status
published
Products (12)
mantisbt/mantisbt
2.0.0
mantisbt/mantisbt
2.0.1
mantisbt/mantisbt
2.1.0
mantisbt/mantisbt
2.1.1
mantisbt/mantisbt
2.1.2
mantisbt/mantisbt
2.2.0
mantisbt/mantisbt
2.2.2
mantisbt/mantisbt
2.2.3
mantisbt/mantisbt
2.2.4
mantisbt/mantisbt
2.4.0
... and 2 more
Published
May 21, 2017
Tracked Since
Feb 18, 2026