ArchLinux: 201411-3: mantisbt: sql injection
Summary
Edwin Gozeling and Wim Visser discovered that when the project_id parameter of the SOAP-request starts with the integer of a project to which the user (or anonymous) is authorized, the ENTIRE value will become the first item of $t_projects. As this value is concatenated in the SQL statement, SQL-injection becomes possible.
Resolution
Upgrade to 1.2.17-3.
# pacman -Syu "mantisbt>=1.2.17-3"
The problem has been fixed upstream [0] but no release version is
available yet.
References
[0] https://github.com/mantisbt/mantisbt/commit/99ffb0af https://access.redhat.com/security/cve/CVE-2014-8554 https://seclists.org/oss-sec/2014/q4/478 https://bugs.archlinux.org/task/42683
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.