If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
                
            References
                    | Link | Resource | 
|---|---|
| http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/100142 | Third Party Advisory VDB Entry | 
| https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory | 
| http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/100142 | Third Party Advisory VDB Entry | 
| https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 03:09
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://openwall.com/lists/oss-security/2017/08/04/6 - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/100142 - Third Party Advisory, VDB Entry | |
| References | () https://mantisbt.org/bugs/view.php?id=23173 - Vendor Advisory | 
Information
                Published : 2017-08-05 15:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-12419
Mitre link : CVE-2017-12419
CVE.ORG link : CVE-2017-12419
JSON object : View
Products Affected
                mysql
- mysql
mariadb
- mariadb
mantisbt
- mantisbt
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
