Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Mantis: XSS and SQL injection vulnerabilities
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200509-16
(Mantis: XSS and SQL injection vulnerabilities)
Mantis fails to properly sanitize untrusted input before using it.
This leads to an SQL injection and several cross-site scripting
A possible hacker could possibly use the SQL injection vulnerability to
access or modify information from the Mantis database. Furthermore the
cross-site scripting issues give a possible hacker the ability to inject and
execute malicious script code or to steal cookie-based authentication
credentials, potentially compromising the victim's browser.
There is no known workaround at this time.
All Mantis users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.2"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|HP 15-f010wm, Laptop Windows 10 Intel N2830 CPU @ 2.16 Ghz, 4GB Ram Touch Screen
|AMD A8-6600K 3.9GHz Quad-Core (AD660KWOHLBOX) Processor
|Intel Core i5-8600 4.3GHz Turbo Hexa Core LGA1151 300 Series 65W Processor
|Intel Pentium MMX SY060 200MHz/66 mhz Socket/Base 7 CPU FV80503200 Processor
No Discussions have been posted on this vulnerability.