Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 5 Dec 2014 22:12:12 -0000
From: "P Richards" <>
To: <>,
	"'Damien Regad'" <>
Subject: RE: CVE-2014-6316: URL redirection issue in MantisBT

In addition, the credit information for this report again appears to be not state the facts correctly. The issue with ?return= was something that I've previously complained about, and the development team chose not to fix at the time.


The CVE indicator of 2014 makes it appear that the vulnerability was first identified in 2014, but in fact, it's one that's been known about since a lot earlier - but previous developers argued not to fix I believe (I'll need to pull out a old HDD and go for chat logs to confirm).


For example, I have test web requests stored demonstrating this issue since at least April 2013 ( , and I believe that actually the identification of this issue pre-dates this. 


Therefore, I don’t believe it is correct to state that the issue was first reported by “Mathias Karlsson” in May 2014, when it was identified as an issue prior to April 2013.


Equally, I don’t believe that putting in the description “Paul Richards also found another redirection issue in permalink_page.php, which turned out to have the same root cause.” is a valid indication of the issue - in terms of the ?return parameter, Mantis used the same functionality in around 4-5 pages.


In addition, whilst I did state that I would leave testing of the fix to someone else, the final fix for this issue looks rather similar to the proposal fix I suggested for further testing of:


[23:16:46] <paulr>          if ( preg_match( '@^(?P<path>' . preg_quote( $t_path, '@' ) . ')' . $t_pattern . '$@', $t_url, $t_matches ) ) {

[23:16:46] <paulr>                  $t_type = 1;

[23:16:46] <paulr> -        } else if ( preg_match( '@^(?P<path>' . preg_quote( $t_short_path, '@' ) . ')' . $t_pattern . '$@', $t_url, $t_matches ) ) {

[23:16:46] <paulr> +        } else if ( $t_short_path != '' && ( preg_match( '@^(?P<path>' . preg_quote( $t_short_path, '@' ) . ')' . $t_pattern . '$@', $t_url, $t_matches ) ) ) {

[23:16:46] <paulr>                  $t_type = 2;

[23:16:46] <paulr>          } else if ( preg_match( '@^(?P<path>)' . $t_pattern . '$@', $t_url, $t_matches ) ) {

[23:16:46] <paulr>                  $t_type = 3;

[23:16:46] <paulr>          }

[23:16:46] <paulr>  

[23:16:57] <paulr> not directly related or well

[23:17:07] <paulr> i'm wondering if the above would be correct or not ;p






-----Original Message-----
From: Damien Regad [] 
Sent: 03 December 2014 23:13
Subject: [oss-security] CVE-2014-6316: URL redirection issue in MantisBT




Please update CVE-2014-6316 with the information below





A bug in the URL sanitization routine allows an attacker to craft an URL that can redirect outside of the MantisBT instance's domain when the software is installed at the web server's root.


e.g.  <> will redirect to Google.


Affected versions:

=> 1.2.0a3, <= 1.2.17


Fixed in versions:

1.2.18 (not yet released)



See Github [1]




Redirection in login_page.php was first reported [3] by Mathias Karlsson

( <> as part of Offensive Security's bug bounty program [4]; issue was also independently discovered and reported by Ryan Giobbi who made the original CVE request [2], Shahee Mirza [5] and Alejo Popovici [6].


Paul Richards also found another redirection issue in permalink_page.php, which turned out to have the same root cause.


The issue was fixed by Damien Regad (MantisBT Developer).



Further details available in our issue tracker [2]



[1]  <>

[2]  <>

[3]  <>

[4]  <>

[5]  <>

[6]  <>



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.