Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 18 Jan 2013 22:31:03 +1100
From: David Hicks <d@...id.au>
To: oss-security@...ts.openwall.com
Cc: Jakub Galczyk <jakub.galczyk@...il.com>
Subject: CVE request: MantisBT before 1.2.13 match_type XSS vulnerability

Hi list,

Jakub Galczyk discovered[1][2] a cross site scripting (XSS)
vulnerability in MantisBT 1.2.12 and earlier versions that allows a
malicious person to trick the browser of a target user into executing
arbitrary JavaScript via the URL: search.php?match_type="><script...

This vulnerability is particularly wide reaching due to search.php being
usable by anonymous users on public facing installations of MantisBT (no
user account required).

Patches against 1.2.x and master branches are attached and alternatively
available at [2].

References:
[1]
http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html
[2] http://www.mantisbt.org/bugs/view.php?id=15373

The MantisBT project will release MantisBT 1.2.13 shortly and advise
popular Linux distributions packaging MantisBT to either apply the patch
or bump package versions to 1.2.13.

Can a CVE ID please be assigned to this issue?

With thanks,
David Hicks
MantisBT Developer
#mantisbt irc.freenode.net
http://www.mantisbt.org/bugs/

Bcc: mantisbt-dev@...ts.sourceforge.net

View attachment "master-1.2.x_0001-Fix-15373-match_type-XSS-vulnerability.patch" of type "text/x-patch" (1571 bytes)

View attachment "master_0001-Fix-15373-match_type-XSS-vulnerability.patch" of type "text/x-patch" (1573 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ