A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER['PHP_SELF'] to generate URLs.
References
Link | Resource |
---|---|
http://www.mantisbt.org/bugs/view.php?id=22742 | Exploit Issue Tracking |
http://www.securitytracker.com/id/1038278 | |
https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1 | Patch |
https://github.com/mantisbt/mantisbt/pull/1094 | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-04-18 17:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-7897
Mitre link : CVE-2017-7897
CVE.ORG link : CVE-2017-7897
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')