← Zuruck zu CVEs
CVE-2012-1122
N/ABeschreibung
bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privileges for a project to bypass intended access restrictions and move bug reports to a different project.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht6/29/2012
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
mantisbt:mantisbt
Schwachen (CWE)
CWE-264
Referenzen
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html(secalert@redhat.com)
http://secunia.com/advisories/48258(secalert@redhat.com)
http://secunia.com/advisories/49572(secalert@redhat.com)
http://secunia.com/advisories/51199(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-201211-01.xml(secalert@redhat.com)
http://www.debian.org/security/2012/dsa-2500(secalert@redhat.com)
http://www.mantisbt.org/bugs/changelog_page.php?version_id=140(secalert@redhat.com)
http://www.mantisbt.org/bugs/view.php?id=13748(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/06/9(secalert@redhat.com)
http://www.securityfocus.com/bid/52313(secalert@redhat.com)
https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/48258(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/49572(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/51199(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201211-01.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2012/dsa-2500(af854a3a-2127-422b-91ae-364da2661108)
http://www.mantisbt.org/bugs/changelog_page.php?version_id=140(af854a3a-2127-422b-91ae-364da2661108)
http://www.mantisbt.org/bugs/view.php?id=13748(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/06/9(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/52313(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.