The MantisBT project was notified by Gjoko Krstic of Zero Science Lab
(email@example.com) of multiple vulnerabilities affecting MantisBT
The two following advisories have been released explaining the
vulnerabilities in greater detail:
As one of these vulnerabilities allows the reading of arbitrary files
from the file system we are treating this issue with critical severity.
Please note that this issue only affects users who have not removed the
"admin" directory from their MantisBT installation. We recommend,
instruct and warn users to remove this directory after installation
however it is clear that many users ignore these warnings.
I have requested CVE numbers via oss-sec (awaiting list moderation).
We have released MantisBT 1.2.4 which resolves the issue for users
of our stable 1.2.x branch. We do have a patch for MantisBT 1.1.x available in the repository as well, however this doesn't apply to Gentoo.
The bug report tracking this issue upstream at MantisBT:
If there are any questions or concerns please feel free to contact me.
Steps to Reproduce:
Apologies for the oversight, Gentoo does still ship mantisbt-1.1.8.
The patch to apply to this version can be obtained through our repository at:
Please note that MantisBT 1.1.x is not officially supported by the MantisBT project and is not recommended for use. We have made a significant number of security improvements in 1.2.x that aren't available in 1.1.x (not just bug fixes, but general architecture changes).
(In reply to comment #0)
> If there are any questions or concerns please feel free to contact me.
Thank you for the report, David.
CVE-2010-4348: Cross site scripting
CVE-2010-4349: Path disclosure
CVE-2010-4350: Local file inclusion
Thank you David. New version was just added to the tree and I've dropped old, vulnerable versions. Arch teams, please, stabilize www-apps/mantisbt-1.2.4.
amd64 done. Thanks Agostino
ppc stable, last arch done
Thanks, folks. GLSA request filed.
Directory traversal vulnerability in admin/upgrade_unattended.php in
MantisBT before 1.2.4 allows remote attackers to include and execute
arbitrary local files via a .. (dot dot) in the db_type parameter, related
to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote
attackers to obtain sensitive information via an invalid db_type parameter,
which reveals the installation path in an error message, related to an
unsafe call by MantisBT to a function in the ADOdb Library for PHP.
Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in
MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script
or HTML via the db_type parameter, related to an unsafe call by MantisBT to
a function in the ADOdb Library for PHP.
Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT
before 1.2.3 allows remote attackers to inject arbitrary web script or HTML
via the Summary field, a different vector than CVE-2010-3303.
Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.3
allow remote authenticated administrators to inject arbitrary web script or
HTML via (1) a plugin name, related to manage_plugin_uninstall.php; (2) an
enumeration value or (3) a String value of a custom field, related to
core/cfdefs/cfdef_standard.php; or a (4) project or (5) category name to
This issue was resolved and addressed in
GLSA 201211-01 at http://security.gentoo.org/glsa/glsa-201211-01.xml
by GLSA coordinator Tobias Heinlein (keytoaster).