A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2017/03/30/4 | Mailing List Third Party Advisory |
http://www.mantisbt.org/bugs/view.php?id=22568 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/97253 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038169 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-03-31 04:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-7241
Mitre link : CVE-2017-7241
CVE.ORG link : CVE-2017-7241
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')