by r0t,der4444,cembo,VietMafia

Tuesday, December 13, 2005

Mantis bugtracking system XSS vuln.

Mantis bugtracking system XSS vuln.

Vuln. dicovered by : r0t
Date: 13 dec. 2005
vendor:http://www.mantisbt.org/
affected version: 1.0.0rc3,1.0.0rc2 and prior




Product Description:

Mantis is a web-based bugtracking system. It is written in the PHP scripting language and requires the MySQL database and a webserver. Mantis has been installed on Windows, Mac OS, OS/2, and a variety of Unix operating systems. Almost any web browser should be able to function as a client. It is released under the terms of the GNU General Public License (GPL).
Mantis is free to use and modify. It is free to redistribute as long as you abide by the distribution terms of the GPL.



Vuln. Description:

Mantis contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "target_field" parameter in "view_filters_page.php" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.



example:
/view_filters_page.php?for_screen=1&target
_field=%22%3E%3Cscript%3Ealert('r0t')%3C/
script%3E


Solution:
Edit the source code to ensure that input is properly sanitised.

3 Comments:

Anonymous Anonymous told...

Welcome Back!

12:22 PM

 
Anonymous thraxisp told...

This has been fixed in the most recent releases (0.19.4 and 1.0.0rc4). It would be nice if you ntified the developers, rather than posting the issue on a public site. This would allow us to close the vulnerability before it is exploited.

9:09 PM

 
Anonymous r0t told...

great to hear that , you had fixed .
about reporting to develop. dont worry about Mantis in this weeks i will not publish.:)

2:26 AM

 

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew