Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x53v-v9xp-gf6g

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.8

Описание

MantisBT XSS via move_attachments_page.php

A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.

Пакеты

Наименование

mantisbt/mantisbt

composer
Затронутые версииВерсия исправления

< 1.3.9

1.3.9

Наименование

mantisbt/mantisbt

composer
Затронутые версииВерсия исправления

>= 2.0.0, < 2.1.3

2.1.3

Наименование

mantisbt/mantisbt

composer
Затронутые версииВерсия исправления

>= 2.2.0, < 2.2.3

2.2.3

EPSS

Процентиль: 74%
0.00804
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.8
ubuntu
почти 9 лет назад

A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.

CVSS3: 4.8
nvd
почти 9 лет назад

A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.

CVSS3: 4.8
debian
почти 9 лет назад

A cross-site scripting (XSS) vulnerability in the MantisBT Move Attach ...

EPSS

Процентиль: 74%
0.00804
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-79