The MantisBT project was notified by Gjoko Krstic of Zero Science Lab
(firstname.lastname@example.org) of multiple vulnerabilities affecting MantisBT
The two following advisories have been released explaining the
vulnerabilities in greater detail:
As one of these vulnerabilities allows the reading of arbitrary files
from the file system we are treating this issue with critical severity.
Please note that this issue only affects users who have not removed the
"admin" directory from their MantisBT installation. We recommend,
instruct and warn users to remove this directory after installation
however it is clear that many users ignore these warnings.
I have requested CVE numbers via oss-sec (awaiting list moderation).
As Redhat is using MantisBT 1.1.x you will need to apply the following
patch to resolve the issue in this older version of MantisBT:
We have also released MantisBT 1.2.4 which resolves the issue for users
of our stable 1.2.x branch.
The bug report tracking this issue upstream at MantisBT:
If there are any questions or concerns please feel free to contact me.
(In reply to comment #0)
thank you for such a complete report.
> I have requested CVE numbers via oss-sec (awaiting list moderation).
Looks like the CVE identifiers request did not made it to oss-security
To Gianluca: We will update this bug with CVE identifiers later, once
they are assigned to the issues. Could you please schedule Fedora MantisBT
updates with the patch below? (Fedora bug will follow shortly)
> As Redhat is using MantisBT 1.1.x you will need to apply the following
> patch to resolve the issue in this older version of MantisBT:
Thanks && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team
These issues affect the versions of the mantis package, as shipped
with Fedora release of 13 and 14.
These issues affect the version of the mantis package, as present
within EPEL-5 repository.
Please schedule an update (patch is above).
Public PoCs (from http://www.mantisbt.org/bugs/view.php?id=12607):
1), cross-site scripting (XSS):
2), local file inclusion (LFI):
3), path disclosure (PD):
Created mantis tracking bugs for this issue
Affects: fedora-all [bug 663299]
I guess it's relevant to note the default apache configuration provided with the mantis package includes the following.
# Admin directory access is disabled by default; do not change this unless
# you are performing the first installation or a database schema update.
# See README.Fedora for more details
Deny from All
Allow from None
Thanks Jan & Gianluca.
Debian (and by extension Ubuntu) use the same Apache configuration to help protect the /admin/ directory. As a result they have decided that the severity of the bug is not as high as first anticipated by upstream.
I guess it comes down to whether a typical user of this package will keep the /admin/ directory permissions in a locked down state.
This issue is more of a concern for Gentoo (and MantisBT users using the upstream package) where the /admin/ directory permissions are not in place.
From Josh Bressers (oss-sec mailing list):
CVE-2010-4348: Cross site scripting
CVE-2010-4349: Path disclosure
CVE-2010-4350: Local file inclusion
Gianluca, David, thank you for the comments:
(In reply to comment #5)
> I guess it's relevant to note the default apache configuration provided with
> the mantis package includes the following.
> # Admin directory access is disabled by default; do not change this unless
> # you are performing the first installation or a database schema update.
> # See README.Fedora for more details
Based on the above comments decreased severity of the issues
to moderate. But we should still address them (to sanitize /
protect also not so likely configurations).
This was fixed in 1.1.8-5