← Volver a CVEs
CVE-2012-1118
N/ADescripcion
The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado6/29/2012
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
mantisbt:mantisbt
Debilidades (CWE)
CWE-264
Referencias
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html(secalert@redhat.com)
http://secunia.com/advisories/48258(secalert@redhat.com)
http://secunia.com/advisories/49572(secalert@redhat.com)
http://secunia.com/advisories/51199(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-201211-01.xml(secalert@redhat.com)
http://www.debian.org/security/2012/dsa-2500(secalert@redhat.com)
http://www.mantisbt.org/bugs/changelog_page.php?version_id=140(secalert@redhat.com)
http://www.mantisbt.org/bugs/view.php?id=10124(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/06/9(secalert@redhat.com)
http://www.securityfocus.com/bid/52313(secalert@redhat.com)
https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48258(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/49572(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51199(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201211-01.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2012/dsa-2500(af854a3a-2127-422b-91ae-364da2661108)
http://www.mantisbt.org/bugs/changelog_page.php?version_id=140(af854a3a-2127-422b-91ae-364da2661108)
http://www.mantisbt.org/bugs/view.php?id=10124(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/06/9(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/52313(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.