Gentoo Logo

Mantis: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200512-12 / Mantis
Release Date December 22, 2005
Latest Revision May 22, 2006: 02
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-apps/mantisbt < 0.19.4 >= 0.19.4 All supported architectures

Related bugreports: #116036


Mantis is affected by multiple vulnerabilities ranging from file upload and SQL injection to cross-site scripting and HTTP response splitting.

2.  Impact Information


Mantis is a web-based bugtracking system written in PHP.


Tobias Klein discovered that Mantis contains several vulnerabilities, including:

  • a file upload vulnerability.
  • an injection vulnerability in filters.
  • an SQL injection vulnerability in the user-management page.
  • a port cross-site-scripting vulnerability in filters.
  • an HTTP header CRLF injection vulnerability.


An attacker could possibly exploit the file upload vulnerability to execute arbitrary script code, and the SQL injection vulnerability to access or modify sensitive information from the Mantis database. Furthermore, the cross-site scripting and HTTP response splitting may allow an attacker to inject and execute malicious script code or to steal cookie-based authentication credentials, potentially compromising the victim's browser.

3.  Resolution Information


There is no known workaround at this time.


All Mantis users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.4"

4.  References


Page updated December 22, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.