A persistent Cross-Site Scripting vulnerability has been discovered in Mantis.
| Package | www-apps/mantisbt on all architectures | 
|---|---|
| Affected versions | < 1.0.8-r1 | 
| Unaffected versions | >= 1.0.8-r1 | 
Mantis is a web-based bug tracking system.
seiji reported that the filename for the uploaded file in bug_report.php is not properly sanitised before being stored.
A remote attacker could upload a file with a specially crafted to a bug report, resulting in the execution of arbitrary HTML and script code within the context of the users's browser. Note that this vulnerability is only exploitable by authenticated users.
There is no known workaround at this time.
All Mantis users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.0.8-r1"
      Release date
      
      March 03, 2008
    
      Latest revision
      
      March 03, 2008: 01
    
      Severity
      
      low
    
      Exploitable
      
      remote
    
Bugzilla entries