Vulnerability Description
The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mantisbt | Mantisbt | <= 1.2.8 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.h
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.h
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.h
- http://secunia.com/advisories/48258Vendor Advisory
- http://secunia.com/advisories/49572Vendor Advisory
- http://secunia.com/advisories/51199
- http://security.gentoo.org/glsa/glsa-201211-01.xml
- http://www.debian.org/security/2012/dsa-2500
- http://www.mantisbt.org/bugs/changelog_page.php?version_id=140
- http://www.mantisbt.org/bugs/view.php?id=13901Patch
- http://www.openwall.com/lists/oss-security/2012/03/06/9
- http://www.securityfocus.com/bid/52313
- https://github.com/mantisbt/mantisbt/commit/f5106be52cf6aa72c521f388e4abb5f0de1fPatch
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.h
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.h
FAQ
What is CVE-2012-1123?
CVE-2012-1123 is a vulnerability with a CVSS score of 7.5 (HIGH). The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password.
How severe is CVE-2012-1123?
CVE-2012-1123 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1123?
Check the references section above for vendor advisories and patch information. Affected products include: Mantisbt Mantisbt.