Cross-site scripting (XSS) vulnerability in NuSOAP 0.9.5, as used in MantisBT and other products, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to an arbitrary PHP script that uses NuSOAP classes.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=595248
git.debian.org/?p=users/olberger-guest/nusoap.git%3Ba=blob%3Bf=debian/patches/595248.patch%3Bh=6af3d725fe74d839764d9755c5bb18458a192518%3Bhb=268f03b88c6900d1a87b17734c248c705c22cb07
git.debian.org/?p=users/olberger-guest/nusoap.git%3Ba=blobdiff%3Bf=debian/patches/595248.patch%3Bh=11202fa70433b62aeab7dfc68af668329bc0fe7e%3Bhp=6af3d725fe74d839764d9755c5bb18458a192518%3Bhb=3ac7a26a49086c6b91fb79e5acafcfcdc5d6980a%3Bhpb=268f03b88c6900d1a87b17734c248c705c22cb07
git.mantisbt.org/?p=mantisbt.git%3Ba=commit%3Bh=edb817991b99cd5538f102be26865fde7c6b7212
lists.fedoraproject.org/pipermail/package-announce/2010-September/048317.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/048325.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html
lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html
secunia.com/advisories/41653
sourceforge.net/mailarchive/message.php?msg_name=4C8FC573.3060900%40leetcode.net
sourceforge.net/projects/nusoap/forums/forum/193579/topic/3834005
www.mantisbt.org/bugs/changelog_page.php?version_id=111
www.mantisbt.org/bugs/view.php?id=12312
www.openwall.com/lists/oss-security/2010/09/03/2
www.openwall.com/lists/oss-security/2010/09/07/4
www.openwall.com/lists/oss-security/2010/09/14/12
www.openwall.com/lists/oss-security/2010/09/14/13
www.securityfocus.com/bid/42959
www.vupen.com/english/advisories/2010/2535
bugzilla.redhat.com/show_bug.cgi?id=629585
bugzilla.redhat.com/show_bug.cgi?id=633011