Bug 948978 (CVE-2013-1934) - CVE-2013-1934 mantis: XSS on the Configuration Report page when displaying complex value
Summary: CVE-2013-1934 mantis: XSS on the Configuration Report page when displaying co...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-1934
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 948997
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-04-05 15:06 UTC by Jan Lieskovsky
Modified: 2021-10-19 22:01 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-19 22:01:14 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2013-04-05 15:06:46 UTC
A cross-site scripting (XSS) flaw was found in the way MantisBT, a web-based issue tracking system, sanitized content of certain configuration options prior displaying them ('complex' configuration options containing JavaScript were not sanitized properly previously). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context of the MantisBT user's session.

References:
[1] http://www.openwall.com/lists/oss-security/2013/04/04/8

Upstream ticket:
[2] http://www.mantisbt.org/bugs/view.php?id=15416

Upstream patch:
[3] http://github.com/mantisbt/mantisbt/commit/5858a659efe12743b4360da11e9320c7f6ac6e82 (against 1.2.x branch)

Public reproducer (from [2]):
-----------------------------
- go to adm_config_report.php page
- Add a 'complex' config option like this:

array('test <script>alert ("XSS")</script>')

Comment 1 Jan Lieskovsky 2013-04-05 15:14:22 UTC
This issue did NOT affect the versions of the mantis package, as shipped with Fedora release of 17 and 18 (they already contain particular upstream patch).

--

This issue (possibly [*]) affects the version of the mantis package, as shipped with Fedora EPEL-5.

[*] Possibly because relevant source code part in that version differs "too much" from the proposed patch form and just based on source code review it's not possible to decide it (IOW above provided reproducer needs to be tried against that version to see if relevant upstream patch needs to be backported).

Comment 2 Jan Lieskovsky 2013-04-05 15:47:34 UTC
Created mantis tracking bugs for this issue

Affects: epel-5 [bug 948997]

Comment 3 Jan Lieskovsky 2013-04-09 10:02:26 UTC
The CVE identifier of CVE-2013-1934 has been assigned to this issue:
  http://www.openwall.com/lists/oss-security/2013/04/09/1


Note You need to log in before you can comment on or make changes to this bug.