Hi.

On Wed, Dec 15, 2010 at 02:07:43PM +1100, David Hicks wrote:
> 
> The MantisBT project was notified by Gjoko Krstic of Zero Science Lab
> (gj...@zeroscience.mk) of multiple vulnerabilities affecting MantisBT
> <1.2.4.
> 
> The two following advisories have been released explaining the
> vulnerabilities in greater detail:
> 
> http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4983.php
> http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4984.php
> 
> As one of these vulnerabilities allows the reading of arbitrary files
> from the file system we are treating this issue with critical severity.
> Please note that this issue only affects users who have not removed the
> "admin" directory from their MantisBT installation. We recommend,
> instruct and warn users to remove this directory after installation
> however it is clear that many users ignore these warnings.
> 
> I have requested CVE numbers via oss-sec (awaiting list moderation).
> 
> As Debian is using MantisBT 1.1.x you will need to apply the following
> patch to resolve the issue in this older version of MantisBT:
> http://git.mantisbt.org/?p=mantisbt.git;a=commitdiff_plain;h=2641fdc60d2032ae1586338d6416e1eadabd7590
> 

AFAICT, Debian installations may not be vulnerable as the admin/ dir is 
protected in principle by the Apache configuration of the package :

# The Administrative directory should not be publicly accessible,
# since the tools herein allow for access to the database without
# authentications.

<Directory /usr/share/mantis/www/admin>
        order deny,allow
        deny from all
</Directory>

Still, removing it completely may be safer.

Of course, applying a patch wouldn't hurt.

Maybe the security/severity should be downgraded ?

I'll let the maintainer or other Debian security team complement the analysis.

Best regards,



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to