Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-25288

Опубликовано: 30 сент. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mantisremovedpackage

EPSS

Процентиль: 73%
0.00745
Низкий

Связанные уязвимости

CVSS3: 4.8
ubuntu
больше 5 лет назад

An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.

CVSS3: 4.8
nvd
больше 5 лет назад

An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.

CVSS3: 4.8
github
больше 3 лет назад

MantisBT XXS where a Custom Field with a crafted Regular Expression property is used

EPSS

Процентиль: 73%
0.00745
Низкий