MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.
References
Configurations
History
No history.
Information
Published : 2014-12-06 21:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-9117
Mitre link : CVE-2014-9117
CVE.ORG link : CVE-2014-9117
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-284
Improper Access Control