Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 22 Oct 2013 20:05:40 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: MantisBT before 1.2.16 XSS vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/21/2013 04:26 PM, Damien Regad wrote:
> Greetings
> 
> Roland Becker (MantisBT developer) discovered and fixed [1] an XSS 
> vulnerability issue affecting MantisBT releases 1.0.0 to 1.2.15
> included.
> 
> Account_sponsor_page.php.php did not correctly sanitize project
> names, enabling a malicious user to execute malicious JavaScript
> when visiting that page.
> 
> The criticality of this issue is compounded by the fact that a 
> high-privilege account (typically project manager or administrator)
> is required to edit project names.
> 
> Patches attached to [1]. Can you please assign a CVE ID to this
> issue ?
> 
> Thank you
> 
> D. Regad MantisBT Developer http://mantisbt.org/
> 
> [1] http://www.mantisbt.org/bugs/view.php?id=16513
> 
> BCC: mantisbt-dev@...ts.sourceforge.net
> 

Please use CVE-2013-4460 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=OwHh
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.