blob: 54af5d2c329e7ab73274dc8710602f4d924f1d8a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200803-04">
<title>Mantis: Cross-Site Scripting</title>
A persistent Cross-Site Scripting vulnerability has been discovered in
<product type="ebuild">mantis</product>
<announced>March 03, 2008</announced>
<revised>March 03, 2008: 01</revised>
<package name="www-apps/mantisbt" auto="yes" arch="*">
<unaffected range="ge">1.0.8-r1</unaffected>
<vulnerable range="lt">1.0.8-r1</vulnerable>
Mantis is a web-based bug tracking system.
seiji reported that the filename for the uploaded file in
bug_report.php is not properly sanitised before being stored.
<impact type="low">
A remote attacker could upload a file with a specially crafted to a bug
report, resulting in the execution of arbitrary HTML and script code
within the context of the users's browser. Note that this vulnerability
is only exploitable by authenticated users.
There is no known workaround at this time.
All Mantis users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.0.8-r1&quot;</code>
<uri link="">CVE-2007-6611</uri>
<metadata tag="requester" timestamp="Sun, 10 Feb 2008 18:16:34 +0000">
<metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 18:16:43 +0000">
<metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:32:54 +0000">