Описание
MantisBT XSS via adm_config_report.php's action parameter
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-6973
- https://github.com/mantisbt/mantisbt/commit/034cd07b47af37366fc7b726cb4a4f971d3d3fb9
- https://github.com/mantisbt/mantisbt/commit/15e52e84c389afe8b03ed3cdb59b6549257ed197
- https://github.com/mantisbt/mantisbt/commit/da74c5aa02bcf21cfaab1180f892c22415e5fea6
- http://www.mantisbt.org/bugs/view.php?id=22537
Пакеты
mantisbt/mantisbt
< 1.3.8
1.3.8
mantisbt/mantisbt
>= 2.0.0, < 2.1.2
2.1.2
mantisbt/mantisbt
>= 2.2.0, < 2.2.2
2.2.2
Связанные уязвимости
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
A cross-site scripting (XSS) vulnerability in the MantisBT Configurati ...