The following issue was found in MantisBT: MantisBT has two modes of operations to select the current project. The second of these, so-called the "extended project browser", is vulnerable to XSS attacks as the code did not check that a given subproject id is indeed an integer. This allows an attacker to execute arbitrary Javascript code by forging the MantisBT project cookie. This issue is fixed in the yet-to-be released 1.2.18 release of MantisBT. Upstream Patch: http://github.com/mantisbt/mantisbt/commit/511564cc Upstream issue details: http://www.mantisbt.org/bugs/view.php?id=17890 CVE request: http://seclists.org/oss-sec/2014/q4/867
Created mantis tracking bugs for this issue: Affects: fedora-all [bug 1170182] Affects: epel-5 [bug 1170183]
mantis-1.2.18-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
mantis-1.2.18-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
mantis-1.2.18-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.