Package: mantis
Severity: important
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for matnis.

Advisory[0]:
| seiji has discovered a vulnerability in Mantis, which can be exploited by
| malicious users to conduct script insertion attacks.
| 
| Input passed as the filename for the uploaded file in bug_report.php is not
| properly sanitised before being stored. This can be exploited to insert
| arbitrary HTML and script code, which is executed in a user's browser session
| in context of an affected site when the malicious filename is viewed in
| view.php.
| 
| Successful exploitation requires valid user credentials.

The following patch fixes the problem:
http://www.mantisbt.org/bugs/file_download.php?file_id=1591&type=bug

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://secunia.com/advisories/28185/

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpAQrBMfJPol.pgp
Description: PGP signature

Reply via email to