cpe:/a:mantisbt:mantisbt:1.3.10 cpe:/a:mantisbt:mantisbt:2.0.0 cpe:/a:mantisbt:mantisbt:2.0.1 cpe:/a:mantisbt:mantisbt:2.1.0 cpe:/a:mantisbt:mantisbt:2.1.1 cpe:/a:mantisbt:mantisbt:2.1.2 cpe:/a:mantisbt:mantisbt:2.2.0 cpe:/a:mantisbt:mantisbt:2.2.2 cpe:/a:mantisbt:mantisbt:2.2.3 cpe:/a:mantisbt:mantisbt:2.2.4 cpe:/a:mantisbt:mantisbt:2.4.0 CVE-2017-7620 2017-05-21T10:29:00.180-04:00 2017-07-07T21:29:17.193-04:00 4.3 NETWORK MEDIUM NONE NONE PARTIAL NONE http://nvd.nist.gov SECTRACK 1038538 EXPLOIT-DB 42043 MISC http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt MISC http://mantisbt.org/bugs/view.php?id=22909 CONFIRM https://mantisbt.org/bugs/view.php?id=22702 CONFIRM https://mantisbt.org/bugs/view.php?id=22816 MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.