|
Message-ID: <1358551271.11550.2@d.hx.id.au> Date: Sat, 19 Jan 2013 10:21:11 +1100 From: David Hicks <d@...id.au> To: oss-security@...ts.openwall.com Cc: Roland Becker <roland@...ol.de>, Robert Munteanu <robert.munteanu@...il.com> Subject: CVE request: MantisBT 1.2.12 only summary.php category/project names XSS vulnerability Hi list, Roland Becker (MantisBT Developer) discovered[1] a XSS vulnerability introduced in MantisBT 1.2.12 with the display of category/project names on the summary.php page. Versions of MantisBT other than 1.2.12 are not affected by this vulnerability. A malicious MantisBT user holding privileged manager/administrator permissions could create a category or project name that contains JavaScript code. Any user visiting summary.php from that point on may then be exposed to having the malicious JavaScript execute within their browser environment. The severity of this issue is limited by the need to hold privileged manager/administrator permissions in order to modify category and project names. However -- there are many use cases where MantisBT installations can have hundreds of sub-projects, each managed by different people/parties that can not or should not be fully trusted. Refer to previous commits 3ca8a164[2] and 6ec3f693[3] to trace back the origin of this vulnerability. References: [1] http://www.mantisbt.org/bugs/view.php?id=15384 [2] https://github.com/mantisbt/mantisbt/commit/3ca8a164641951aba2a459364e656ca0996f8a2b [3] https://github.com/mantisbt/mantisbt/commit/6ec3f693d6d212d6bba788681a206c14df43569f Discussion on the MantisBT Developer Mailing List has indicated that a release of MantisBT 1.2.13 (resolving both this vulnerability and CVE-2013-0197 which was announced on this list ~12 hours ago) will not occur until early next week. As such, a patch is attached for distributions packaging MantisBT 1.2.12. It is recommended this patch be applied as soon as possible. Can a CVE ID please be assigned to this issue? With thanks, David Hicks MantisBT Developer #mantisbt irc.freenode.net http://www.mantisbt.org/bugs/ Bcc: mantisbt-dev@...ts.sourceforge.net View attachment "0001-Fix-15384-summary.php-XSS-vulnerability-in-MantisBT-.patch" of type "text/x-patch" (3260 bytes) Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.