A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2017/03/30/4 | patch mailing list third party advisory |
http://www.securitytracker.com/id/1038169 | vdb entry |
http://www.mantisbt.org/bugs/view.php?id=22537 | patch vendor advisory exploit |
http://www.securityfocus.com/bid/97252 | third party advisory vdb entry |