SB2011092103 - Multiple vulnerabilities in mantisbt.sourceforge.net MantisBT
Published: September 21, 2011 Updated: January 3, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2011-3357)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in bug_actiongroup_ext_page.php in MantisBT before 1.2.8. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to include and execute arbitrary local files via a . (dot dot) in the action parameter, related to bug_actiongroup_page.php.
2) Cross-site scripting (CVE-ID: CVE-2011-3358)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in MantisBT before 1.2.8 when processing the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Cross-site scripting (CVE-ID: CVE-2011-3578)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 when processing action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Cross-site scripting (CVE-ID: CVE-2011-3356)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in config_defaults_inc.php in MantisBT before 1.2.8 when processing the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297
- http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html
- http://secunia.com/advisories/45961
- http://secunia.com/advisories/51199
- http://security.gentoo.org/glsa/glsa-201211-01.xml
- http://securityreason.com/securityalert/8392
- http://www.debian.org/security/2011/dsa-2308
- http://www.mantisbt.org/bugs/view.php?id=13281
- http://www.openwall.com/lists/oss-security/2011/09/04/1
- http://www.openwall.com/lists/oss-security/2011/09/04/2
- http://www.openwall.com/lists/oss-security/2011/09/09/9
- http://www.securityfocus.com/archive/1/519547/100/0/threaded
- http://www.securityfocus.com/bid/49448
- https://bugzilla.redhat.com/show_bug.cgi?id=735514
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69588
- https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d
- https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f
- https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69589
- https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d
- http://www.mantisbt.org/bugs/view.php?id=13191
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69587
- https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034