Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several security related problems have been discovered in Mantis, a
web-based bug tracking system. The Common Vulnerabilities and
Exposures project identifies the following problems:
Missing input sanitising permits remote attackers to inject
arbitrary web script or HTML.
Tobias Klein discovered that Mantis permits remote attackers to
bypass the file upload size restriction.
Tobias Klein discovered several SQL injection vulnerabilities that
permit remote attackers to execute arbitrary SQL commands.
Tobias Klein discovered unspecified "port injection"
vulnerabilities in filters.
Tobias Klein discovered a CRLF injection vulnerability that permits
remote attackers to modify HTTP headers and conduct HTTP response
Tobias Klein discovered several cross-site scripting (XSS)
vulnerabilities that permit remote attackers to inject arbitrary
web script or HTML.
Tobias Klein discovered that Mantis discloses private bugs via
public RSS feeds, which permits remote attackers to obtain
Tobias Klein discovered that Mantis does not properly handle "Make
note private" when a bug is being resolved, which has unknown
impact and attack vectors, probably related to an information
The old stable distribution (woody) does not seem to be affected by
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your mantis package.
Solution : http://www.debian.org/security/2006/dsa-944
Network Security Threat Level: High
Networks Security ID: 15842, 16046
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Dell PowerEdge R720 Dual E5-2660 8C 2.2GHz 384GB 2x 300GB SAS H710 8 Bay 2.5in
|Dell PowerEdge R510 2x X5570 2.93GHz Quad Core 32GB 12x 3TB 7.2K SAS PERC H700
|Dell PowerEdge R720xd Server Dual E5-2609 QC 2.4GHz 64GB 2x 300GB, 10x 4TB 12B
|Dell PowerEdge R710 2x X5690 3.46GHz 6 Core 32GB 6x 600GB 15K SAS PERC 6/i
No Discussions have been posted on this vulnerability.