CVE-2024-45792
📋 TL;DR
An information disclosure vulnerability in Mantis Bug Tracker allows unprivileged registered users to retrieve other users' personal system profile information via crafted POST requests. This affects all MantisBT instances with versions before 2.26.4 that have user registration enabled.
💻 Affected Systems
- Mantis Bug Tracker
📦 What is this software?
Mantisbt by Mantisbt
⚠️ Risk & Real-World Impact
Worst Case
Attackers could harvest sensitive personal information from all user profiles, potentially enabling targeted social engineering, credential stuffing, or identity theft attacks.
Likely Case
Unauthorized access to user profile data including system information, preferences, and potentially contact details, leading to privacy violations.
If Mitigated
Limited exposure with proper access controls and monitoring, though some profile information may still be accessible.
🎯 Exploit Status
Exploitation requires registered user access and involves crafting specific POST requests to vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.26.4
Vendor Advisory: https://github.com/mantisbt/mantisbt/security/advisories/GHSA-h5q3-fjp4-2x7r
Restart Required: No
Instructions:
1. Backup your MantisBT installation and database. 2. Download MantisBT 2.26.4 from mantisbt.org. 3. Replace existing files with new version. 4. Run admin/check.php to verify installation.
🔧 Temporary Workarounds
Disable User Registration
allTemporarily disable new user registration to prevent unauthorized access.
Set $g_allow_signup = OFF; in config_inc.php
Restrict Profile Access
allModify access controls to limit profile viewing permissions.
Adjust $g_view_profiles_threshold in config_inc.php to higher access level
🧯 If You Can't Patch
- Implement network segmentation to isolate MantisBT from sensitive systems
- Enable detailed logging and monitoring for suspicious profile access patterns
🔍 How to Verify
Check if Vulnerable:
Check MantisBT version in admin/check.php or config_defaults_inc.php for version string
Check Version:
grep -r "\$g_mantis_version" config_defaults_inc.php
Verify Fix Applied:
Verify version is 2.26.4 or later and test profile access with low-privilege user accounts
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to profile.php or similar endpoints from single user
- Unusual pattern of profile view events
Network Indicators:
- HTTP POST requests with crafted parameters to user profile endpoints
SIEM Query:
source="mantisbt.log" AND (uri_path="/profile.php" OR uri_path="/user_profile_page.php") AND http_method="POST" AND user_agent NOT CONTAINS "bot" | stats count by src_ip