summaryrefslogtreecommitdiff
blob: 3ce37c49656906c2f7159172c426fba64d17b0cd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201211-01">
  <title>MantisBT: Multiple vulnerabilities</title>
  <synopsis>Multiple vulnerabilities have been found in MantisBT, the worst of
    which allowing for local file inclusion.
  </synopsis>
  <product type="ebuild">MantisBT</product>
  <announced>2012-11-08</announced>
  <revised count="1">2012-11-08</revised>
  <bug>348761</bug>
  <bug>381417</bug>
  <bug>386153</bug>
  <bug>407121</bug>
  <bug>420375</bug>
  <access>remote</access>
  <affected>
    <package name="www-apps/mantisbt" auto="yes" arch="*">
      <unaffected range="ge">1.2.11</unaffected>
      <vulnerable range="lt">1.2.11</vulnerable>
    </package>
  </affected>
  <background>
    <p>MantisBT is a PHP/MySQL/Web based bugtracking system.</p>
  </background>
  <description>
    <p>Multiple vulnerabilities have been discovered in MantisBT. Please review
      the CVE identifiers referenced below for details.
    </p>
  </description>
  <impact type="normal">
    <p>A remote attacker could exploit these vulnerabilities to conduct
      directory traversal attacks, disclose the contents of local files, inject
      arbitrary web scripts, obtain sensitive information, bypass
      authentication and intended access restrictions, or manipulate bugs and
      attachments.
    </p>
  </impact>
  <workaround>
    <p>There is no known workaround at this time.</p>
  </workaround>
  <resolution>
    <p>All MantisBT users should upgrade to the latest version:</p>
    
    <code>
      # emerge --sync
      # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.2.11"
    </code>
    
  </resolution>
  <references>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3303">CVE-2010-3303</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3763">CVE-2010-3763</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4348">CVE-2010-4348</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4349">CVE-2010-4349</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4350">CVE-2010-4350</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2938">CVE-2011-2938</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3356">CVE-2011-3356</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3357">CVE-2011-3357</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3358">CVE-2011-3358</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3578">CVE-2011-3578</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3755">CVE-2011-3755</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1118">CVE-2012-1118</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1119">CVE-2012-1119</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1120">CVE-2012-1120</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1121">CVE-2012-1121</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1122">CVE-2012-1122</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1123">CVE-2012-1123</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2691">CVE-2012-2691</uri>
    <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2692">CVE-2012-2692</uri>
  </references>
  <metadata tag="requester" timestamp="2011-10-07T23:37:13Z">
    underling
  </metadata>
  <metadata tag="submitter" timestamp="2012-11-08T10:37:33Z">
    keytoaster
  </metadata>
</glsa>