It was reported [1] that the MantisBT Configuration Report page (adm_config_report.php) did not escape a parameter before displaying it on the page, allowing an attacker to execute arbitrary JavaScript code. Patch that fixes this issue is at [2] Further details available in Mantis issue tracker [3] [1]: http://seclists.org/oss-sec/2014/q4/617 [2]: https://github.com/mantisbt/mantisbt/commit/49c3d089 [3]: http://www.mantisbt.org/bugs/view.php?id=17870
Created mantis tracking bugs for this issue: Affects: fedora-all [bug 1165153] Affects: epel-all [bug 1165154]
MITRE assigned CVE-2014-8987 to this issue: http://seclists.org/oss-sec/2014/q4/692
mantis-1.2.18-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
mantis-1.2.18-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
mantis-1.2.18-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.