Vulnerabilities > CVE-2017-7615 - Weak Password Recovery Mechanism for Forgotten Password vulnerability in Mantisbt

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
mantisbt
CWE-640
exploit available
metasploit

Summary

MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php.

Vulnerable Configurations

Part Description Count
Application
Mantisbt
119

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Password Recovery Exploitation
    An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure. Most of them use only one security question . For instance, mother's maiden name tends to be a fairly popular one. Unfortunately in many cases this information is not very hard to find, especially if the attacker knows the legitimate user. These generic security questions are also re-used across many applications, thus making them even more insecure. An attacker could for instance overhear a coworker talking to a bank representative at the work place and supplying their mother's maiden name for verification purposes. An attacker can then try to log in into one of the victim's accounts, click on "forgot password" and there is a good chance that the security question there will be to provide mother's maiden name. A weak password recovery scheme totally undermines the effectiveness of a strong password scheme.

Exploit-Db

descriptionMantis Bug Tracker 1.3.0/2.3.0 - Password Reset. CVE-2017-7615. Webapps exploit for PHP platform
fileexploits/php/webapps/41890.txt
idEDB-ID:41890
last seen2017-04-17
modified2017-04-16
platformphp
port
published2017-04-16
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/41890/
titleMantis Bug Tracker 1.3.0/2.3.0 - Password Reset
typewebapps

Metasploit

descriptionMantisBT before 1.3.10, 2.2.4, and 2.3.1 are vulnerable to unauthenticated password reset.
idMSF:AUXILIARY/ADMIN/HTTP/MANTISBT_PASSWORD_RESET
last seen2020-06-10
modified2017-07-24
published2017-07-09
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/admin/http/mantisbt_password_reset.rb
titleMantisBT password reset

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/142171/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt
idPACKETSTORM:142171
last seen2017-04-16
published2017-04-16
reporterhyp3rlinx
sourcehttps://packetstormsecurity.com/files/142171/Mantis-Bug-Tracker-1.3.0-2.3.0-Remote-Password-Reset.html
titleMantis Bug Tracker 1.3.0 / 2.3.0 Remote Password Reset