MantisBT 1.2.x before 1.2.2 insecurely handles attachments and MIME types. Arbitrary inline attachment rendering could lead to cross-domain scripting or other browser attacks.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2009-2802 | third party advisory |
https://mantisbt.org/blog/archives/mantisbt/113 | vendor advisory |
https://mantisbt.org/bugs/view.php?id=11952 | vendor advisory |