MantisBT Multiple Vulnerabilities


Description   A weakness and multiple vulnerabilities have been reported in MantisBT, which can be exploited by malicious users to conduct script insertion and SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct spoofing, cross-site scripting, and SQL injection attacks and bypass certain security restrictions.
1) The application does not properly restrict access to the XML Plugin functionality, which can be exploited to gain access to otherwise restricted functionality and subsequently e.g. manipulate otherwise restricted database information.
2) Certain input passed to plugins/XmlImportExport/ImportXml.php is not properly sanitised before being used in a call to the "preg_replace()" function with the "e" modifier and can be exploited to inject and execute arbitrary PHP code.
Note: This vulnerability can be exploited in conjunction with vulnerability #1.
3) The application does not properly restrict access to the download attachments functionality, which can be exploited to download otherwise restricted files.
4) Certain input passed to adm_config_report.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
5) Input passed via the "sort" and "dir" parameters to view_all_set.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
6) Certain input is not properly sanitised within the "string_insert_hrefs()" function (core/string_api.php) before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site if malicious data is viewed.
7) Certain input is not properly sanitised in the "projax_array_serialize_for_autocomplete()" function (core/projax_api.php) before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site if malicious data is viewed.
8) Certain input related to inline display of flash is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site if malicious data is viewed.
9) Certain input related to invalid config ID handling within adm_config_report.php is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site if malicious data is viewed.
10) Certain input passed related to core/helper_api.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation of this vulnerability requires that the "Extended project browser" option is enabled.
11) Input passed via the "filter" parameter to view_filters_page.php is not properly verified before being used in a call to the "unserialize()" function. This can be exploited to perform certain otherwise restricted actions via specially crafted serialized objects.
12) Input passed via the "project_id" parameter to a SOAP request is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
13) An error when handling emails on relations can be exploited to disclose certain otherwise restricted information of a related issue.
14) An error when handling history can be exploited to disclose otherwise restricted attachments.
15) The application does not properly restrict access to certain SOAP API utility functions, which can be exploited to disclose otherwise restricted information.
16) An error when handling LDAP binds can be exploited to perform an otherwise restricted unauthenticated bind and subsequently gain otherwise restricted access.
17) Input passed via the "return" GET parameter to "login_page.php" is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.
18) An error when handling bug reporting can be exploited to set an otherwise restricted handler.
The weakness and the vulnerabilities are reported in 1.2.17. Other versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
MantisBT 1.x
     
Solution   Update to version 1.2.18.
     
CVE   CVE-2014-9506
CVE-2014-9388
CVE-2014-9280
CVE-2014-9272
CVE-2014-9271
CVE-2014-9270
CVE-2014-9269
CVE-2014-9089
CVE-2014-8988
CVE-2014-8987
CVE-2014-8986
CVE-2014-8598
CVE-2014-8554
CVE-2014-8553
CVE-2014-7146
CVE-2014-6387
CVE-2014-6316
     
References   MantisBT:
https://www.mantisbt.org/bugs/changelog_page.php?project=mantisbt&
version=1.2.18
https://www.mantisbt.org/blog/?p=301
polzin:
https://www.mantisbt.org/bugs/view.php?id=9885
Matthew Daley:
https://www.mantisbt.org/bugs/view.php?id=17640
rgiobbi:
https://www.mantisbt.org/bugs/view.php?id=17648
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
SQL injection Prevention - POST : suspicious SELECT statement in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
SQL injection Prevention - POST : possible version probing in data
3.2.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
3.2.0
SQL injection Prevention - POST : suspicious CREATE statement in data
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious UNION statement in data
3.2.0
SQL injection Prevention - POST : suspicious DROP statement in data
3.2.0
SQL injection Prevention - POST : suspicious INSERT statement in data
3.2.0
SQL injection Prevention - POST : suspicious OR statement in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious EXEC statement in data
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
SQL injection Prevention - POST : suspicious HAVING statement in data
3.2.0
SQL injection Prevention - POST : suspicious CAST statement in data
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2014-11-26 

 Target Type 
Server 

 Possible exploit 
Remote