{"id":"CVE-2024-23830","summary":"MantisBT Host Header Injection vulnerability","details":"MantisBT is an open source issue tracker. Prior to version 2.26.1, an unauthenticated attacker who knows a user's email address and username can hijack the user's account by poisoning the link in the password reset notification message. A patch is available in version 2.26.1. As a workaround, define `$g_path` as appropriate in `config_inc.php`.","aliases":["GHSA-mcqj-7p29-9528"],"modified":"2026-04-10T05:09:39.115551Z","published":"2024-02-20T21:44:27.707Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/23xxx/CVE-2024-23830.json","cwe_ids":["CWE-74"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://mantisbt.org/bugs/view.php?id=19381"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/23xxx/CVE-2024-23830.json"},{"type":"ADVISORY","url":"https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23830"},{"type":"FIX","url":"https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mantisbt/mantisbt","events":[{"introduced":"0"},{"fixed":"b8778103a11ddd979a773259323398b3942e24c0"}]}],"versions":["release-1.2.0a1","release-1.2.0a2","release-1.2.0a3","release-1.2.0rc1","release-1.3.0-beta.1","release-1.3.0-beta.2","release-1.3.0-beta.3","release-1.3.0-rc.1","release-1.3.0-rc.2","release-2.0.0","release-2.0.0-beta.1","release-2.0.0-beta.2","release-2.0.0-beta.3","release-2.0.0-rc.1","release-2.0.0-rc.2","release-2.1.0","release-2.10.0","release-2.11.0","release-2.12.0","release-2.13.0","release-2.14.0","release-2.15.0","release-2.16.0","release-2.17.0","release-2.18.0","release-2.19.0","release-2.2.0","release-2.20.0","release-2.21.0","release-2.22.0","release-2.23.0","release-2.24.0","release-2.25.0","release-2.26.0","release-2.3.0","release-2.4.0","release-2.5.0","release-2.6.0","release-2.7.0","release-2.8.0","release-2.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-23830.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}]}