Debian Security Advisory
DSA-944-1 mantis -- several vulnerabilities
- Date Reported:
- 17 Jan 2006
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 345288.
In the Bugtraq database (at SecurityFocus): BugTraq ID 15842, BugTraq ID 16046.
In Mitre's CVE dictionary: CVE-2005-4238, CVE-2005-4518, CVE-2005-4519, CVE-2005-4520, CVE-2005-4521, CVE-2005-4522, CVE-2005-4523, CVE-2005-4524.
- More information:
Several security related problems have been discovered in Mantis, a web-based bug tracking system. The Common Vulnerabilities and Exposures project identifies the following problems:
Missing input sanitising allows remote attackers to inject arbitrary web script or HTML.
Tobias Klein discovered that Mantis allows remote attackers to bypass the file upload size restriction.
Tobias Klein discovered several SQL injection vulnerabilities that allow remote attackers to execute arbitrary SQL commands.
Tobias Klein discovered unspecified "port injection" vulnerabilities in filters.
Tobias Klein discovered a CRLF injection vulnerability that allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks.
Tobias Klein discovered several cross-site scripting (XSS) vulnerabilities that allow remote attackers to inject arbitrary web script or HTML.
Tobias Klein discovered that Mantis discloses private bugs via public RSS feeds, which allows remote attackers to obtain sensitive information.
Tobias Klein discovered that Mantis does not properly handle "Make note private" when a bug is being resolved, which has unknown impact and attack vectors, probably related to an information leak.
The old stable distribution (woody) does not seem to be affected by these problems.
For the stable distribution (sarge) these problems have been fixed in version 0.19.2-5sarge1.
For the unstable distribution (sid) these problems have been fixed in version 0.19.4-1.
We recommend that you upgrade your mantis package.
- Fixed in:
Debian GNU/Linux 3.1 (sarge)
- Architecture-independent component:
MD5 checksums of the listed files are available in the original advisory.