Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 18 Jan 2013 22:31:03 +1100
From: David Hicks <d@...id.au>
To: oss-security@...ts.openwall.com
Cc: Jakub Galczyk <jakub.galczyk@...il.com>
Subject: CVE request: MantisBT before 1.2.13 match_type XSS vulnerability

Hi list,

Jakub Galczyk discovered[1][2] a cross site scripting (XSS)
vulnerability in MantisBT 1.2.12 and earlier versions that allows a
malicious person to trick the browser of a target user into executing
arbitrary JavaScript via the URL: search.php?match_type="><script...

This vulnerability is particularly wide reaching due to search.php being
usable by anonymous users on public facing installations of MantisBT (no
user account required).

Patches against 1.2.x and master branches are attached and alternatively
available at [2].

References:
[1]
http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html
[2] http://www.mantisbt.org/bugs/view.php?id=15373

The MantisBT project will release MantisBT 1.2.13 shortly and advise
popular Linux distributions packaging MantisBT to either apply the patch
or bump package versions to 1.2.13.

Can a CVE ID please be assigned to this issue?

With thanks,
David Hicks
MantisBT Developer
#mantisbt irc.freenode.net
http://www.mantisbt.org/bugs/

Bcc: mantisbt-dev@...ts.sourceforge.net

View attachment "master-1.2.x_0001-Fix-15373-match_type-XSS-vulnerability.patch" of type "text/x-patch" (1571 bytes)

View attachment "master_0001-Fix-15373-match_type-XSS-vulnerability.patch" of type "text/x-patch" (1573 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.