A cross-site scripting (XSS) flaw was found in the way MantisBT, a web-based issue tracking system, sanitized content of certain configuration options prior displaying them ('complex' configuration options containing JavaScript were not sanitized properly previously). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context of the MantisBT user's session. References: [1] http://www.openwall.com/lists/oss-security/2013/04/04/8 Upstream ticket: [2] http://www.mantisbt.org/bugs/view.php?id=15416 Upstream patch: [3] http://github.com/mantisbt/mantisbt/commit/5858a659efe12743b4360da11e9320c7f6ac6e82 (against 1.2.x branch) Public reproducer (from [2]): ----------------------------- - go to adm_config_report.php page - Add a 'complex' config option like this: array('test <script>alert ("XSS")</script>')
This issue did NOT affect the versions of the mantis package, as shipped with Fedora release of 17 and 18 (they already contain particular upstream patch). -- This issue (possibly [*]) affects the version of the mantis package, as shipped with Fedora EPEL-5. [*] Possibly because relevant source code part in that version differs "too much" from the proposed patch form and just based on source code review it's not possible to decide it (IOW above provided reproducer needs to be tried against that version to see if relevant upstream patch needs to be backported).
Created mantis tracking bugs for this issue Affects: epel-5 [bug 948997]
The CVE identifier of CVE-2013-1934 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/04/09/1