Bug 948978 (CVE-2013-1934)

Summary: CVE-2013-1934 mantis: XSS on the Configuration Report page when displaying complex value
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: extras-orphan, giallu, sven
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-19 22:01:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 948997    
Bug Blocks:    

Description Jan Lieskovsky 2013-04-05 15:06:46 UTC
A cross-site scripting (XSS) flaw was found in the way MantisBT, a web-based issue tracking system, sanitized content of certain configuration options prior displaying them ('complex' configuration options containing JavaScript were not sanitized properly previously). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context of the MantisBT user's session.

References:
[1] http://www.openwall.com/lists/oss-security/2013/04/04/8

Upstream ticket:
[2] http://www.mantisbt.org/bugs/view.php?id=15416

Upstream patch:
[3] http://github.com/mantisbt/mantisbt/commit/5858a659efe12743b4360da11e9320c7f6ac6e82 (against 1.2.x branch)

Public reproducer (from [2]):
-----------------------------
- go to adm_config_report.php page
- Add a 'complex' config option like this:

array('test <script>alert ("XSS")</script>')

Comment 1 Jan Lieskovsky 2013-04-05 15:14:22 UTC
This issue did NOT affect the versions of the mantis package, as shipped with Fedora release of 17 and 18 (they already contain particular upstream patch).

--

This issue (possibly [*]) affects the version of the mantis package, as shipped with Fedora EPEL-5.

[*] Possibly because relevant source code part in that version differs "too much" from the proposed patch form and just based on source code review it's not possible to decide it (IOW above provided reproducer needs to be tried against that version to see if relevant upstream patch needs to be backported).

Comment 2 Jan Lieskovsky 2013-04-05 15:47:34 UTC
Created mantis tracking bugs for this issue

Affects: epel-5 [bug 948997]

Comment 3 Jan Lieskovsky 2013-04-09 10:02:26 UTC
The CVE identifier of CVE-2013-1934 has been assigned to this issue:
  http://www.openwall.com/lists/oss-security/2013/04/09/1