If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/100142 | Third Party Advisory VDB Entry |
https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-08-05 15:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-12419
Mitre link : CVE-2017-12419
CVE.ORG link : CVE-2017-12419
JSON object : View
Products Affected
mariadb
- mariadb
mysql
- mysql
mantisbt
- mantisbt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor