Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 17 Jan 2015 00:59:38 +0100
From: Damien Regad <>
Subject: CVE-2014-9571: XSS in install.php


Please update CVE-2014-9571 with the information below


Vulnerabilities described in this section can be used by attackers to 
steal cookies of application’s administrator and other website users. 
Attackers can also perform spear phishing attacks against web site 
visitors by replacing original content of the web site with arbitrary 
HTML and script code, perform drive-by-download attacks by injecting 
malware into web pages, and bypass existing CSRF protection mechanism.

The vulnerability exists due to insufficient filtration of input data 
passed via the "admin_username" and "admin_password" HTTP GET parameters 
to "/[admin]/install.php" script. A remote attacker can trick a 
logged-in user to open a specially crafted link and execute arbitrary 
HTML and script code in browser in context of the vulnerable website.

Below are two exploitation examples that use the "alert()" JavaScript 
function to display "immuniweb" word:


Note, that "[admin]" in the URL is changed by default during MantisBT 
installation. Therefore, the attacker must know the location of the 
administrative interface in order to perform the attack. However, admin 
panel URL can be bruteforced or predicted in many cases.

Affected versions:
- <= 1.2.19
- <= 1.3.0-beta.1

Fixed in versions:
- 1.2.19 (not yet released)
- 1.3.0-beta.2 (not yet released)

See Github [1]

This vulnerability was reported [2] by High-Tech Bridge Security 
Research Lab (, via advisory ID HTB23243 [3].
The issue was fixed by Damien Regad (MantisBT Developer).

Further details available in our issue tracker [4]

[1] (1.2.x) (1.3.x)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.