This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200512-12
(Mantis: Multiple vulnerabilities)
Tobias Klein discovered that Mantis contains several vulnerabilities,
a file upload vulnerability.
an injection vulnerability in filters.
a SQL injection vulnerability in the user-management page.
a port cross-site-scripting vulnerability in filters.
an HTTP header CRLF injection vulnerability.
An attacker could possibly exploit the file upload vulnerability to
execute arbitrary script code, and the SQL injection vulnerability to
access or modify sensitive information from the Mantis database.
Furthermore, the cross-site scripting and HTTP response splitting may
allow an attacker to inject and execute malicious script code or to
steal cookie-based authentication credentials, potentially compromising
the victim's browser.
There is no known workaround at this time.
See also :
All Mantis users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/mantisbt-0.19.4'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 20353 (gentoo_GLSA-200512-12.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now