|
Message-ID: <52672EF4.8060802@redhat.com> Date: Tue, 22 Oct 2013 20:05:40 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/21/2013 04:26 PM, Damien Regad wrote: > Greetings > > Roland Becker (MantisBT developer) discovered and fixed [1] an XSS > vulnerability issue affecting MantisBT releases 1.0.0 to 1.2.15 > included. > > Account_sponsor_page.php.php did not correctly sanitize project > names, enabling a malicious user to execute malicious JavaScript > when visiting that page. > > The criticality of this issue is compounded by the fact that a > high-privilege account (typically project manager or administrator) > is required to edit project names. > > Patches attached to [1]. Can you please assign a CVE ID to this > issue ? > > Thank you > > D. Regad MantisBT Developer http://mantisbt.org/ > > [1] http://www.mantisbt.org/bugs/view.php?id=16513 > > BCC: mantisbt-dev@...ts.sourceforge.net > Please use CVE-2013-4460 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJSZy7zAAoJEBYNRVNeJnmTJbQQAKtmOfKLuorxnrgvX+1lApw9 FWmvTBG03WTYhERpP7TCLAMFn2PEdna4/7prfcxUswR09RaJnsc1ThwynNFvbi5H rv2N53RvieD8tHVpFRI3z0STLXshe8E61WaSRW2anZDsw3Bcj0sVLrbv4MF3Suhr GtueiO73KF229e4DpY1jpXCLMgJiruQYAdG+1DVbFm94eM5D4JkWIln0rkJHLE0Y 7AdJ7GN+It3UaXhkPEwE9xZ2pdvO0koSpGPYLjLJxLIYV6v2HTNtidMCgHONVI6e nsxKymufL6RnuR5ycb3vP2Y/5GEUhnXCQZftziDtYAWiB2bBG9PoCdJJGsMm9wAH YsyZfMqf28wcpZ1U/YY5XuOVDUCWNEnnjDKZH95i5pZmKXZhhUb3+kg4v9BJhYGw nsLKkHT2F/lJEbZecDtf/G3xrAmBgptc/76+fZSoqCb/1JvlMrFsCYiXMBr5W69j ItOlc2rwrbinU0KhjW+U53KvT2EekrTkc4XHOYo1W56jG4Byse6RtrAcZRxDt/gt u597YrsXb9ImJFhwSA80Lq7MmjBLX34TyedvtM7sCe2U2NK5bOvwZMn57R5HOCxe uGytwgmRtY04FHbziDkAYpSbuW8Apn6/38NbFThZeZrgOR7dQWaXvfLJxRUeNo/8 grYD/r1nVF6aENVOfgc7 =OwHh -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.