VID |
21744 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of Mantis which is older or as old as than version 1.0.0a3 is detected as installed on the host. Mantis is a freely available PHP-based bug tracking system that uses a MySQL backend database. Mantis versions 1.0.0a3 and earlier are vulnerable to multiple input validation vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting and SQL injection attacks.
* Note: This check solely relied on the version of Mantis on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://bugs.mantisbt.org/view.php?id=5751 http://bugs.mantisbt.org/view.php?id=5956 http://bugs.mantisbt.org/view.php?id=5959 http://bugs.mantisbt.org/view.php?id=6002 http://secunia.com/advisories/16506/
* Platforms Affected: Mantis version 1.0.0a3 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of mantis (1.0.0rc2 or later), as available from the Mantis Web site at http://www.mantisbt.org/
For Debian GNU/Linux 3.1 (sarge): Upgrade to the latest version of mantis (0.19.2-4 or later), as listed in Debian Security Advisory DSA-778-1 at http://www.debian.org/security/2005/dsa-778 |
Related URL |
CVE-2005-2556,CVE-2005-2557,CVE-2005-3090,CVE-2005-3091 (CVE) |
Related URL |
14604 (SecurityFocus) |
Related URL |
21958,21961 (ISS) |
|