Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 15 Nov 2014 01:26:39 -0000
From: "P Richards" <>
To: <>,
	"'Damien Regad'" <>
Cc: <>
Subject: RE: CVE Request: XSS vulnerability in MantisBT 1.2.13

Hi Damien,

Please can you ensure that you appropriate proper credit for security issues - we identified this issue in Master back in May and this was due to be backported to be 1.2.18 release:

The adm_config_report.php displays a dropdown list of configuration values, but does not check that the config value is valid - therefore someone could change the post/get request to modify the value to pass XSS onto the page. 

We fixed this issue in Master with the following commit, and I believe I requested this to be back-ported at the time. You modified the code not to trigger an error with the commit and to fall back to the default of no value selected.

I don't believe it is correct to state that an issue was discovered in November that we had already discovered, fixed and were planning on backporting to the 1.2.18 release in May, and not credit the people who discovered and fixed the original issue.


-----Original Message-----
From: Damien Regad [] 
Sent: 14 November 2014 22:30
Subject: [oss-security] CVE Request: XSS vulnerability in MantisBT 1.2.13

Please assign a CVE ID for the following issue.


The MantisBT Configuration Report page (adm_config_report.php) did not escape a parameter before displaying it on the page, allowing an attacker to execute arbitrary JavaScript code.

The severity of this issue is mitigated by the need to have a high-privileged account (by default, administrator) to access the configuration report page.

Affected versions:
 >= 1.2.13, <= 1.2.17

Fixed in versions:
1.2.18 (not yet released)

See Github [1]

Issue was discovered by Alejo Popovici and fixed by Damien Regad (MantisBT Developer)

Further details available in our issue tracker [2]

D. Regad
MantisBT Developer


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.