Secunia Security Advisory - EgiX has discovered a vulnerability in Mantis, which can be exploited by malicious users to compromise a vulnerable system.
8218edef0fb63ff63d65d6dcea729138e0161cc0bd4f94d3042aaffa91c0ee21
----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/
----------------------------------------------------------------------
TITLE:
Mantis "sort" PHP Code Execution Vulnerability
SECUNIA ADVISORY ID:
SA32314
VERIFY ADVISORY:
http://secunia.com/advisories/32314/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Mantis 1.x
http://secunia.com/advisories/product/5571/
DESCRIPTION:
EgiX has discovered a vulnerability in Mantis, which can be exploited
by malicious users to compromise a vulnerable system.
Input passed to the "sort" parameter in manage_proj_page.php is not
properly sanitised before being used in a "create_function()" call.
This can be exploited to execute arbitrary PHP code.
Successful exploitation requires valid user credentials.
The vulnerability is confirmed in version 1.1.2 and reported in
version 1.1.3. Other versions may also be affected.
SOLUTION:
Restrict access to manage_proj_page.php (e.g. with ".htaccess").
PROVIDED AND/OR DISCOVERED BY:
EgiX
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/6768
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------