oss-sec mailing list archives
Re: CVE request: mantis < 1.1.2
From: "Steven M. Christey" <coley () linus mitre org>
Date: Sun, 27 Jul 2008 18:22:38 -0400 (EDT)
====================================================== Name: CVE-2008-2276 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2276 Reference: BUGTRAQ:20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities Reference: URL:http://marc.info/?l=bugtraq&m=121130774617956&w=4 Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?group_id=14963&release_id=595025 Reference: FEDORA:FEDORA-2008-6647 Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00801.html Reference: FEDORA:FEDORA-2008-6657 Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00813.html Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Reference: SECUNIA:31171 Reference: URL:http://secunia.com/advisories/31171 Reference: XF:mantis-usercreate-csrf(42447) Reference: URL:http://xforce.iss.net/xforce/xfdb/42447 Cross-site request forgery (CSRF) vulnerability in manage_user_create.php in Mantis 1.1.1 allows remote attackers to create new administrative users via a crafted link. ====================================================== Name: CVE-2008-3331 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3331 Reference: BUGTRAQ:20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities Reference: URL:http://marc.info/?l=bugtraq&m=121130774617956&w=4 Reference: CONFIRM:http://www.mantisbt.org/bugs/changelog_page.php Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Cross-site scripting (XSS) vulnerability in return_dynamic_filters.php in Mantis before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the filter_target parameter. ====================================================== Name: CVE-2008-3332 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3332 Reference: BUGTRAQ:20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities Reference: URL:http://marc.info/?l=bugtraq&m=121130774617956&w=4 Reference: CONFIRM:http://www.mantisbt.org/bugs/changelog_page.php Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Eval injection vulnerability in adm_config_set.php in Mantis before 1.1.2 allows remote authenticated administrators to execute arbitrary code via the value parameter. ====================================================== Name: CVE-2008-3333 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3333 Reference: CONFIRM:http://www.mantisbt.org/bugs/changelog_page.php Reference: CONFIRM:http://www.mantisbt.org/bugs/view.php?id=9154 Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to read and include arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).
Current thread:
- CVE request: mantis < 1.1.2 Tomas Hoger (Jul 21)
- Re: CVE request: mantis < 1.1.2 Steven M. Christey (Jul 27)