Описание
MantisBT vulnerable to XSS through config_option parameter in adm_config_report.php
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted 'config_option' parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-7309
- https://github.com/mantisbt/mantisbt/commit/0243375e32bc24878e309f3d6ef6d8cfb3e2f278
- https://github.com/mantisbt/mantisbt/commit/c9e5b1d0404503022605459552faeaf610bf15ae
- https://github.com/mantisbt/mantisbt/commit/e881dd79df422033bbea88914fc0a717fae40358
- http://openwall.com/lists/oss-security/2017/03/30/4
- http://www.mantisbt.org/bugs/view.php?id=22579
Пакеты
mantisbt/mantisbt
< 1.3.9
1.3.9
mantisbt/mantisbt
>= 2.1.0, < 2.1.3
2.1.3
mantisbt/mantisbt
>= 2.2.0, < 2.2.3
2.2.3
Связанные уязвимости
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted 'config_option' parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3.
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted 'config_option' parameter. This is fixed in 1.3.9, 2.1.3, and 2.2.3.
A cross-site scripting (XSS) vulnerability in the MantisBT Configurati ...