Bug 1063111 (CVE-2014-1608, CVE-2014-1609)

Summary: CVE-2014-1608 CVE-2014-1609 mantis: SQL injection issues
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: extras-orphan, giallu, guillaume, sven
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:31:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1063113, 1063114    
Bug Blocks:    

Description Murray McAllister 2014-02-10 03:24:20 UTC
SQL injection issues were discovered in MantisBT, an open source issue tracker.

CVE-2014-1608 patch:
https://github.com/mantisbt/mantisbt/commit/00b4c17088fa56594d85fe46b6c6057bb3421102

CVE-2014-1609 patch:
https://github.com/mantisbt/mantisbt/commit/7efe0175f0853e18ebfacedfd2374c4179028b3f

It was reported that versions 1.1.0a4 to 1.2.15 are affected.

References:
http://www.ocert.org/advisories/ocert-2014-001.html

Comment 1 Murray McAllister 2014-02-10 03:25:58 UTC
Created mantis tracking bugs for this issue:

Affects: fedora-all [bug 1063113]
Affects: epel-5 [bug 1063114]

Comment 2 Fedora Update System 2014-03-13 05:01:29 UTC
mantis-1.2.17-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2014-03-13 05:07:13 UTC
mantis-1.2.17-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Product Security DevOps Team 2019-06-08 02:31:28 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.