Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <50F9AAE0.4020603@redhat.com>
Date: Fri, 18 Jan 2013 13:04:48 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: David Hicks <d@...id.au>, Jakub Galczyk <jakub.galczyk@...il.com>
Subject: Re: CVE request: MantisBT before 1.2.13 match_type
 XSS vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/18/2013 04:31 AM, David Hicks wrote:
> Hi list,
> 
> Jakub Galczyk discovered[1][2] a cross site scripting (XSS) 
> vulnerability in MantisBT 1.2.12 and earlier versions that allows
> a malicious person to trick the browser of a target user into
> executing arbitrary JavaScript via the URL:
> search.php?match_type="><script...
> 
> This vulnerability is particularly wide reaching due to search.php
> being usable by anonymous users on public facing installations of
> MantisBT (no user account required).
> 
> Patches against 1.2.x and master branches are attached and
> alternatively available at [2].
> 
> References: [1] 
> http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html
>
> 
[2] http://www.mantisbt.org/bugs/view.php?id=15373
> 
> The MantisBT project will release MantisBT 1.2.13 shortly and
> advise popular Linux distributions packaging MantisBT to either
> apply the patch or bump package versions to 1.2.13.
> 
> Can a CVE ID please be assigned to this issue?
> 
> With thanks, David Hicks MantisBT Developer #mantisbt
> irc.freenode.net http://www.mantisbt.org/bugs/
> 
> Bcc: mantisbt-dev@...ts.sourceforge.net
> 

Please use CVE-2013-0197 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=4IdZ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.