blob: 76baa76ef21f50e246ffd7b0dee43369a6d564d3 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200509-16">
<title>Mantis: XSS and SQL injection vulnerabilities</title>
Mantis is affected by an SQL injection and several cross-site scripting
(XSS) vulnerabilities.
<product type="ebuild">Mantis</product>
<announced>September 24, 2005</announced>
<revised>September 24, 2005: 01</revised>
<package name="www-apps/mantisbt" auto="yes" arch="*">
<unaffected range="ge">0.19.2</unaffected>
<vulnerable range="lt">0.19.2</vulnerable>
Mantis is a web-based bugtracking system written in PHP.
Mantis fails to properly sanitize untrusted input before using it.
This leads to an SQL injection and several cross-site scripting
<impact type="normal">
An attacker could possibly use the SQL injection vulnerability to
access or modify information from the Mantis database. Furthermore the
cross-site scripting issues give an attacker the ability to inject and
execute malicious script code or to steal cookie-based authentication
credentials, potentially compromising the victim's browser.
There is no known workaround at this time.
All Mantis users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.2&quot;</code>
<uri link="">CAN-2005-2556</uri>
<uri link="">CAN-2005-2557</uri>
<uri link="">Secunia Advisory SA16506</uri>
<metadata tag="submitter" timestamp="Fri, 23 Sep 2005 12:20:33 +0000">
<metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:21:10 +0000">