Lucene search

K
gentooGentoo FoundationGLSA-200803-04
HistoryMar 03, 2008 - 12:00 a.m.

Mantis: Cross-Site Scripting

2008-03-0300:00:00
Gentoo Foundation
security.gentoo.org
9

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.1%

Background

Mantis is a web-based bug tracking system.

Description

seiji reported that the filename for the uploaded file in bug_report.php is not properly sanitised before being stored.

Impact

A remote attacker could upload a file with a specially crafted to a bug report, resulting in the execution of arbitrary HTML and script code within the context of the users’s browser. Note that this vulnerability is only exploitable by authenticated users.

Workaround

There is no known workaround at this time.

Resolution

All Mantis users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.0.8-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/mantisbt< 1.0.8-r1UNKNOWN

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.1%