An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://mantisbt.org/bugs/view.php?id=29135 | vendor advisory issue tracking exploit |
https://mantisbt.org/bugs/view.php?id=30384 | vendor advisory issue tracking exploit |
https://mantisbt.org/blog/archives/mantisbt/719 | release notes vendor advisory |