Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several security related problems have been discovered in Mantis, a
web-based bug tracking system. The Common Vulnerabilities and
Exposures project identifies the following problems:
Missing input sanitising permits remote attackers to inject
arbitrary web script or HTML.
Tobias Klein discovered that Mantis permits remote attackers to
bypass the file upload size restriction.
Tobias Klein discovered several SQL injection vulnerabilities that
permit remote attackers to execute arbitrary SQL commands.
Tobias Klein discovered unspecified "port injection"
vulnerabilities in filters.
Tobias Klein discovered a CRLF injection vulnerability that permits
remote attackers to modify HTTP headers and conduct HTTP response
Tobias Klein discovered several cross-site scripting (XSS)
vulnerabilities that permit remote attackers to inject arbitrary
web script or HTML.
Tobias Klein discovered that Mantis discloses private bugs via
public RSS feeds, which permits remote attackers to obtain
Tobias Klein discovered that Mantis does not properly handle "Make
note private" when a bug is being resolved, which has unknown
impact and attack vectors, probably related to an information
The old stable distribution (woody) does not seem to be affected by
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your mantis package.
Solution : http://www.debian.org/security/2006/dsa-944
Network Security Threat Level: High
Networks Security ID: 15842, 16046
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|MagicJack Go VoIP 12 Months FREE Service MAGICJACK GO Brand New
|OOMA CORE HUB & SCOUT VOIP PHONE SYSTEM
|LOT 2 AVAYA 9608G LCD DISPLAY IP VoIP OFFICE BUSINESS PHONE TELEPHONE GIGABIT
|Obihai OBi200 VoIP Telephone Adapter with Google Voice & SIP @NEW@
No Discussions have been posted on this vulnerability.