Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 330481 (CVE-2010-2802) - <www-apps/mantisbt-1.2.2: cross-domain scripting or other browser attacks (CVE-2010-2802)
Summary: <www-apps/mantisbt-1.2.2: cross-domain scripting or other browser attacks (CV...
Status: RESOLVED FIXED
Alias: CVE-2010-2802
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-07-30 10:31 UTC by Peter Volkov (RETIRED)
Modified: 2010-10-03 00:06 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Peter Volkov (RETIRED) gentoo-dev 2010-07-30 10:31:54 UTC
MantisBT 1.2.2 is a security update for the stable 1.2.x branch. All 
installations that are currently running any 1.2.x version are advised 
to upgrade to this release.

Issue #11952 covers a security fix to the display of inline attachments, 
where "Arbitrary inline attachment rendering could lead to cross-domain 
scripting or other browser attacks".  See 
http://www.mantisbt.org/bugs/view.php?id=11952 for further details and 
information.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2010-07-30 10:38:13 UTC
New version was bumped. Arch teams, please, stabilize www-apps/mantisbt-1.2.2.
Comment 2 Markos Chandras (RETIRED) gentoo-dev 2010-07-31 14:48:50 UTC
Are you sure?

http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/www-apps/mantisbt/

I cant see version 1.2.2
Comment 3 David Hicks 2010-08-01 03:10:04 UTC
Peter, thanks for following up with this new release.

I am the MantisBT developer who patched the flaw so if you have any further questions about the vulnerability, please feel free to contact me.

Essentially it was possible to upload a HTML file attachment to a bug and rename the extension to .gif (or another file format that MantisBT shows inline). MantisBT would then use pecl-fileinfo (if available) to determine the real MIME type of the file (text/html in this example) and this MIME type would be conveyed to users viewing/downloading the file. The browser would thus attempt to render the HTML file within the browser rather than downloading it.

The solution was to pass a flag to the download script to inform the script of the Content-Disposition header to send to the user. This flag is protected by a CSRF token to ensure that the only way a file can be shown inline within a browser is if a user is currently looking at a bug report with inline previews enabled. Even in that case, inline previews will currently only work within <img src="???" /> where browsers won't attempt to render potentially harmful content such as text/html (they're expecting an image only).
Comment 4 Peter Volkov (RETIRED) gentoo-dev 2010-08-01 05:42:50 UTC
(In reply to comment #2)
> I cant see version 1.2.2

Markos, I forgot to confirm commit. Now everything is in place. Thank you.

David, thank you very much for explanation. BTW do you want to be CC'ed to mantinsbt bugs in Gentoo? If yes, I can add your e-mail into metadata.xml.
Comment 5 Markos Chandras (RETIRED) gentoo-dev 2010-08-01 11:42:55 UTC
amd64 done
Comment 6 Christian Faulhammer (RETIRED) gentoo-dev 2010-08-01 13:33:27 UTC
stable x86
Comment 7 Joe Jezak (RETIRED) gentoo-dev 2010-08-11 22:41:50 UTC
Marked ppc stable.
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2010-09-25 16:42:25 UTC
CVE-2010-2802 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2802):
  Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.2 allows
  remote authenticated users to inject arbitrary web script or HTML via an
  HTML document with a .gif filename extension, related to inline attachments.

Comment 9 Stefan Behte (RETIRED) gentoo-dev Security 2010-10-01 20:28:41 UTC
CVE-2010-2802 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2802):
  Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.2
  allows remote authenticated users to inject arbitrary web script or
  HTML via an HTML document with a .gif filename extension, related to
  inline attachments.

Comment 10 Tim Sammut (RETIRED) gentoo-dev 2010-10-02 15:32:14 UTC
GLSA Vote: No.
Comment 11 Stefan Behte (RETIRED) gentoo-dev Security 2010-10-03 00:06:01 UTC
No, too, closing NOGLSA.