Bug 1170192 (CVE-2014-9281)

Summary: CVE-2014-9281 mantis: XSS in admin panel / copy_field.php
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: giallu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: MantisBT 1.2.18 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:36:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1170194    
Bug Blocks:    

Description Martin Prpič 2014-12-03 13:29:52 UTC
The following issue was found in MantisBT:

Use of unsanitized parameters in this admin page allow an attacker to execute arbitrary JavaScript code. 

This issue is fixed in the yet-to-be released 1.2.18 release of MantisBT.

Upstream Patch:

http://github.com/mantisbt/mantisbt/commit/e5fc835a

Upstream issue details:

http://www.mantisbt.org/bugs/view.php?id=17876
http://www.offensive-security.com/bug-bounty-program/

CVE request:

http://seclists.org/oss-sec/2014/q4/867

Comment 1 Martin Prpič 2014-12-03 13:32:04 UTC
Created mantis tracking bugs for this issue:

Affects: fedora-all [bug 1170194]

Comment 2 Martin Prpič 2014-12-05 13:26:48 UTC
*** Bug 1170197 has been marked as a duplicate of this bug. ***

Comment 3 Martin Prpič 2014-12-05 13:30:01 UTC
This issue is tracked under one CVE along with:

An attacker could upload a malicious Flash file renamed to bear a recognized image extension (e.g. xss.swf ==> screenshot.png). Since by default MantisBT is configured to allow images to be displayed inline, it is possible to get the Flash to execute.

This issue is fixed in the yet-to-be released 1.2.18 release of MantisBT.

Upstream Patch:

http://github.com/mantisbt/mantisbt/commit/9fb8cf36f

Upstream issue details:

http://www.mantisbt.org/bugs/view.php?id=17874

CVE assignment:

http://seclists.org/oss-sec/2014/q4/902

Comment 4 Vasyl Kaigorodov 2014-12-08 13:15:28 UTC
As per MITRE this should be tracked as CVE-2014-9281

http://seclists.org/oss-sec/2014/q4/924

Comment 5 Fedora Update System 2014-12-20 08:34:38 UTC
mantis-1.2.18-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Fedora Update System 2014-12-20 08:47:53 UTC
mantis-1.2.18-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2014-12-20 08:51:29 UTC
mantis-1.2.18-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Product Security DevOps Team 2019-06-08 02:36:55 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.