Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.GENTOO_GLSA-200512-12.NASL
HistoryDec 30, 2005 - 12:00 a.m.

GLSA-200512-12 : Mantis: Multiple vulnerabilities

2005-12-3000:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
11

The remote host is affected by the vulnerability described in GLSA-200512-12 (Mantis: Multiple vulnerabilities)

Tobias Klein discovered that Mantis contains several vulnerabilities,     including:
a file upload vulnerability.
an injection vulnerability in filters.
a SQL injection vulnerability in the user-management page.
a port cross-site-scripting vulnerability in filters.
an HTTP header CRLF injection vulnerability.

Impact :

An attacker could possibly exploit the file upload vulnerability to     execute arbitrary script code, and the SQL injection vulnerability to     access or modify sensitive information from the Mantis database.
Furthermore, the cross-site scripting and HTTP response splitting may     allow an attacker to inject and execute malicious script code or to     steal cookie-based authentication credentials, potentially compromising     the victim's browser.

Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200512-12.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(20353);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2005-4518", "CVE-2005-4519", "CVE-2005-4520", "CVE-2005-4521", "CVE-2005-4522");
  script_xref(name:"GLSA", value:"200512-12");

  script_name(english:"GLSA-200512-12 : Mantis: Multiple vulnerabilities");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200512-12
(Mantis: Multiple vulnerabilities)

    Tobias Klein discovered that Mantis contains several vulnerabilities,
    including:
    a file upload vulnerability.
    an injection vulnerability in filters.
    a SQL injection vulnerability in the user-management page.
    a port cross-site-scripting vulnerability in filters.
    an HTTP header CRLF injection vulnerability.
  
Impact :

    An attacker could possibly exploit the file upload vulnerability to
    execute arbitrary script code, and the SQL injection vulnerability to
    access or modify sensitive information from the Mantis database.
    Furthermore, the cross-site scripting and HTTP response splitting may
    allow an attacker to inject and execute malicious script code or to
    steal cookie-based authentication credentials, potentially compromising
    the victim's browser.
  
Workaround :

    There is no known workaround at this time."
  );
  # http://www.mantisbt.org/changelog.php
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.mantisbt.org/bugs/changelog_page.php"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200512-12"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Mantis users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=www-apps/mantisbt-0.19.4'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mantisbt");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2005/12/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/12/30");
  script_set_attribute(attribute:"vuln_publication_date", value:"2005/12/23");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"www-apps/mantisbt", unaffected:make_list("ge 0.19.4"), vulnerable:make_list("lt 0.19.4"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Mantis");
}
VendorProductVersionCPE
gentoolinuxmantisbtp-cpe:/a:gentoo:linux:mantisbt
gentoolinuxcpe:/o:gentoo:linux
Related for GENTOO_GLSA-200512-12.NASL