Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 128822 - www-apps/mantisbt: <=1.0.1 XSS vulnerability (CAN-2006-1577)
Summary: www-apps/mantisbt: <=1.0.1 XSS vulnerability (CAN-2006-1577)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor
Assignee: Gentoo Security
URL: http://pridels.blogspot.com/2006/03/m...
Whiteboard: B4 [noglsa] DerCorny
Keywords:
Depends on:
Blocks:
 
Reported: 2006-04-04 14:15 UTC by Philippe Chaintreuil
Modified: 2006-04-22 03:02 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Philippe Chaintreuil 2006-04-04 14:15:24 UTC
A friend just forwarded this URL to me: http://pridels.blogspot.com/2006/03/mantis-xss-vuln.html

   Quote:
===========================================================================
###############################################
Vuln. discovered by : r0t
Date: 31 march 2006
vendor:http://www.mantisbt.org/
affected versions:Mantis 1.0.1 and 1.0.0rc5 and prior
###############################################

Vuln. Description:

Mantis contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "start_day" "start_year" "start_month" paremeters in "view_all_set.php" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

examples:

/view_all_set.php?type=1&temporary=y&do_filter_by_date
=on&start_year=2006&start_month=03&start_day=[XSS]

/view_all_set.php?type=1&temporary=y&do_filter_by_date=
on&start_year=[XSS]

/view_all_set.php?type=1&temporary=y&do_filter_by_date
=on&start_year=2006&start_month=[XSS]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/
===========================================================================
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-04 14:28:07 UTC
web-apps, please check if stable versions are affected and please provide new ebuilds, thank you
Comment 2 Philippe Chaintreuil 2006-04-04 14:30:20 UTC
As this is a security issue, I don't know if it should be in a different Component category.

I'm unable to find reference of this bug in the Official Mantis Bug Database, and the referred to "unsecured-systems.com/forum/" doesn't have the referred to thread available to the public.
Comment 3 Philippe Chaintreuil 2006-04-04 14:43:37 UTC
I just submitted a bug to the main Mantis database regarding this issue:

http://bugs.mantisbt.org/view.php?id=6914
Comment 4 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-04 14:47:27 UTC
Very nice, thank you Philippe
Comment 5 schaedpq 2006-04-06 07:51:42 UTC
Mhmm. I got "Access denied" for http://bugs.mantisbt.org/view.php?id=6914. I assume, there is at least some truth in that vulnerability and the mantis team restricted access. I wonder, if the some should be done for this bug, but it is probably anyway to late for that... 
Do you know anything about upstreams time frame for commenting and fixing the issue, Philippe (as bug reporter at upstream)?
Comment 6 Philippe Chaintreuil 2006-04-06 08:54:02 UTC
thraxisp (one of the main Mantis developers I think from the freq of his name on their site) posted "Security issues are usually private to prevent exploits until they are resolved. Thanks for the heads up." on 4/4/2006.

He marked the http://bugs.mantisbt.org/view.php?id=6914 bug was closed "duplicate of 0006902", which gives me the "Access denied" you mentioned in regards to the bug I summited to them.

Sum up: My bug must have been a dup of an open bug, so I have no more information for you at this time.
Comment 7 Thierry Carrez (RETIRED) gentoo-dev 2006-04-15 05:18:02 UTC
Waiting for upstream release
Comment 8 Renat Lumpau (RETIRED) gentoo-dev 2006-04-20 08:04:24 UTC
1.0.2 has been released and is in Portage. Among others, fixes:

- 0006902: [security] XSS in mantis bug track system (thraxisp)
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-04-20 08:21:28 UTC
ppc please test and mark stable.
Comment 10 Tobias Scherbaum (RETIRED) gentoo-dev 2006-04-20 11:57:22 UTC
ppc stable
Comment 11 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-04-20 13:50:05 UTC
This one is ready for GLSA decision. I tend to vote NO.
Comment 12 Thierry Carrez (RETIRED) gentoo-dev 2006-04-21 08:50:24 UTC
I tend to vote no, that XSS requires to follow a very lame URL
Comment 13 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-04-21 14:10:32 UTC
hi, i tend to vote no too
Comment 14 Thierry Carrez (RETIRED) gentoo-dev 2006-04-22 03:02:36 UTC
Closing... feel free to reopen if you intended to vote yes