Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <m4qchh$gtc$1@ger.gmane.org>
Date: Sat, 22 Nov 2014 17:10:28 +0100
From: Damien Regad <dregad@...tisbt.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: XSS vulnerability in MantisBT 1.2.13

On 2014-11-20 00:11, cve-assign@...re.org 
wrote:
>> https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40
>> the selection list in the filters
>
> Use CVE-2014-8986.

Thanks.

Here's some additional information to document this CVE.


Description:

The MantisBT Configuration Report page (adm_config_report.php) did not 
check that the config value retrieved from the cookie was valid, 
allowing XSS attacks.

The severity of this issue is mitigated by the need to have a 
high-privileged account (by default, administrator) to access the 
configuration report page.

Affected versions:
 >= 1.2.13, <= 1.2.17

Fixed in versions:
1.2.18 (not yet released)

Patch:
See Github [1]

Credit:
Issue was discovered by Paul Richards, and jointly fixed by Paul 
Richards & Damien Regad (MantisBT Developer)

References:
Further details available in our issue tracker [2]


D. Regad
MantisBT Developer
http://www.mantisbt.org


[1] http://github.com/mantisbt/mantisbt/commit/e326b73a
[2] http://www.mantisbt.org/bugs/view.php?id=17889



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.