DSA-944-1 mantis -- several vulnerabilities

Related Vulnerabilities: CVE-2005-4238   CVE-2005-4518   CVE-2005-4519   CVE-2005-4520   CVE-2005-4521   CVE-2005-4522   CVE-2005-4523   CVE-2005-4524  

Several security related problems have been discovered in Mantis, a web-based bug tracking system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4238 Missing input sanitising allows remote attackers to inject arbitrary web script or HTML. CVE-2005-4518 Tobias Klein discovered that Mantis allows remote attackers to bypass the file upload size restriction. CVE-2005-4519 Tobias Klein discovered several SQL injection vulnerabilities that allow remote attackers to execute arbitrary SQL commands. CVE-2005-4520 Tobias Klein discovered unspecified "port injection" vulnerabilities in filters. CVE-2005-4521 Tobias Klein discovered a CRLF injection vulnerability that allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks. CVE-2005-4522 Tobias Klein discovered several cross-site scripting (XSS) vulnerabilities that allow remote attackers to inject arbitrary web script or HTML. CVE-2005-4523 Tobias Klein discovered that Mantis discloses private bugs via public RSS feeds, which allows remote attackers to obtain sensitive information. CVE-2005-4524 Tobias Klein discovered that Mantis does not properly handle "Make note private" when a bug is being resolved, which has unknown impact and attack vectors, probably related to an information leak. The old stable distribution (woody) does not seem to be affected by these problems. For the stable distribution (sarge) these problems have been fixed in version 0.19.2-5sarge1. For the unstable distribution (sid) these problems have been fixed in version 0.19.4-1. We recommend that you upgrade your mantis package.

Debian Security Advisory

DSA-944-1 mantis -- several vulnerabilities

Date Reported:
17 Jan 2006
Affected Packages:
mantis
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 345288.
In the Bugtraq database (at SecurityFocus): BugTraq ID 15842, BugTraq ID 16046.
In Mitre's CVE dictionary: CVE-2005-4238, CVE-2005-4518, CVE-2005-4519, CVE-2005-4520, CVE-2005-4521, CVE-2005-4522, CVE-2005-4523, CVE-2005-4524.
More information:

Several security related problems have been discovered in Mantis, a web-based bug tracking system. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2005-4238

    Missing input sanitising allows remote attackers to inject arbitrary web script or HTML.

  • CVE-2005-4518

    Tobias Klein discovered that Mantis allows remote attackers to bypass the file upload size restriction.

  • CVE-2005-4519

    Tobias Klein discovered several SQL injection vulnerabilities that allow remote attackers to execute arbitrary SQL commands.

  • CVE-2005-4520

    Tobias Klein discovered unspecified "port injection" vulnerabilities in filters.

  • CVE-2005-4521

    Tobias Klein discovered a CRLF injection vulnerability that allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks.

  • CVE-2005-4522

    Tobias Klein discovered several cross-site scripting (XSS) vulnerabilities that allow remote attackers to inject arbitrary web script or HTML.

  • CVE-2005-4523

    Tobias Klein discovered that Mantis discloses private bugs via public RSS feeds, which allows remote attackers to obtain sensitive information.

  • CVE-2005-4524

    Tobias Klein discovered that Mantis does not properly handle "Make note private" when a bug is being resolved, which has unknown impact and attack vectors, probably related to an information leak.

The old stable distribution (woody) does not seem to be affected by these problems.

For the stable distribution (sarge) these problems have been fixed in version 0.19.2-5sarge1.

For the unstable distribution (sid) these problems have been fixed in version 0.19.4-1.

We recommend that you upgrade your mantis package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/m/mantis/mantis_0.19.2-5sarge1.dsc
http://security.debian.org/pool/updates/main/m/mantis/mantis_0.19.2-5sarge1.diff.gz
http://security.debian.org/pool/updates/main/m/mantis/mantis_0.19.2.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/m/mantis/mantis_0.19.2-5sarge1_all.deb

MD5 checksums of the listed files are available in the original advisory.