Bug 1477524 (CVE-2017-12061)

Summary: CVE-2017-12061 mantis: XSS in admin/install.php
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: giallu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mantis 1.3.12, mantis 2.5.2 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:19:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1477525    
Bug Blocks:    

Description Adam Mariš 2017-08-02 10:29:58 UTC
An XSS issue was discovered in admin/install.php in MantisBT before
1.3.12 and 2.x before 2.5.2. Some variables under user control in the
MantisBT installation script are not properly sanitized before being
output, allowing remote attackers to inject arbitrary JavaScript code,
as demonstrated by the $f_database, $f_db_username, and
$f_admin_username variables. This is mitigated by the fact that the
admin/ folder should be deleted after installation, and also prevented
by CSP.

Upstream bug:

https://mantisbt.org/bugs/view.php?id=23146

Upstream fix:

1.3.x: https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0
2.x: https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5

References:

http://openwall.com/lists/oss-security/2017/08/01/1

Comment 1 Adam Mariš 2017-08-02 10:31:40 UTC
Created mantis tracking bugs for this issue:

Affects: fedora-all [bug 1477525]

Comment 2 Product Security DevOps Team 2019-06-08 03:19:45 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.