Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/49235 | vdb entry exploit |
http://www.openwall.com/lists/oss-security/2011/08/18/7 | patch mailing list exploit |
http://security.gentoo.org/glsa/glsa-201211-01.xml | vendor advisory |
https://github.com/mantisbt/mantisbt/commit/317f3db3a3c68775de3acf3b15f55b1e3c18f93b | patch |
http://securityreason.com/securityalert/8391 | third party advisory |
https://bugs.gentoo.org/show_bug.cgi?id=379739 | patch exploit |
https://bugs.launchpad.net/ubuntu/+source/mantis/+bug/828857 | patch exploit |
http://packetstormsecurity.org/files/104149 | exploit |
https://bugzilla.redhat.com/show_bug.cgi?id=731777 | patch exploit |
http://secunia.com/advisories/51199 | third party advisory |
http://www.openwall.com/lists/oss-security/2011/08/19/16 | patch mailing list exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html | patch vendor advisory exploit |
http://www.mantisbt.org/bugs/view.php?id=13245 | exploit |