Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several security related problems have been discovered in Mantis, a
web-based bug tracking system. The Common Vulnerabilities and
Exposures project identifies the following problems:
Missing input sanitising permits remote attackers to inject
arbitrary web script or HTML.
Tobias Klein discovered that Mantis permits remote attackers to
bypass the file upload size restriction.
Tobias Klein discovered several SQL injection vulnerabilities that
permit remote attackers to execute arbitrary SQL commands.
Tobias Klein discovered unspecified "port injection"
vulnerabilities in filters.
Tobias Klein discovered a CRLF injection vulnerability that permits
remote attackers to modify HTTP headers and conduct HTTP response
Tobias Klein discovered several cross-site scripting (XSS)
vulnerabilities that permit remote attackers to inject arbitrary
web script or HTML.
Tobias Klein discovered that Mantis discloses private bugs via
public RSS feeds, which permits remote attackers to obtain
Tobias Klein discovered that Mantis does not properly handle "Make
note private" when a bug is being resolved, which has unknown
impact and attack vectors, probably related to an information
The old stable distribution (woody) does not seem to be affected by
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your mantis package.
Solution : http://www.debian.org/security/2006/dsa-944
Network Security Threat Level: High
Networks Security ID: 15842, 16046
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|SEAGATE ST1000DM003 1TB SATA HARD DRIVE 1CH162-306
|HP Z840 1 x E5-2620 V3 AMD W2100 1TB SSD 192GB RAM 1 x 4TB HDD
|Energy-Efficient DELL PowerEdge R710 Server 2x 2.26Ghz L5520 QC 48GB 2x 1TB
|Crucial MX300 1TB 2.5" Solid State Drive 6Gbps (SSD) - CT1050MX300SSD1
No Discussions have been posted on this vulnerability.