Bug 1052583 (CVE-2017-12419) - VUL-0: CVE-2017-12419: mantis,mantisbt: Arbitrary File Read in MantisBT install.php script
Summary: VUL-0: CVE-2017-12419: mantis,mantisbt: Arbitrary File Read in MantisBT insta...
Status: RESOLVED FIXED
Alias: CVE-2017-12419
Product: openSUSE.org
Classification: openSUSE
Component: 3rd party software (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Andreas Stieger
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/189643/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-08-07 13:16 UTC by Andreas Stieger
Modified: 2017-10-06 09:46 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2017-08-07 13:16:02 UTC
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB,
the administrator does not remove the 'admin' directory (as recommended in the
"Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and
the MySQL client has a local_infile setting enabled (in php.ini
mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP
setup), an attacker may take advantage of MySQL's "connect file read" feature to
remotely access files on the MantisBT server.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12419
http://seclists.org/oss-sec/2017/q3/247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12419
http://openwall.com/lists/oss-security/2017/08/04/6
https://mantisbt.org/bugs/view.php?id=23173
Comment 1 Andreas Stieger 2017-10-06 09:46:48 UTC
fixed