A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER['PHP_SELF'] to generate URLs.
References
Link | Resource |
---|---|
https://github.com/mantisbt/mantisbt/pull/1094 | Exploit Patch Vendor Advisory |
https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1 | Patch |
http://www.mantisbt.org/bugs/view.php?id=22742 | Exploit Issue Tracking |
http://www.securitytracker.com/id/1038278 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-04-18 10:59
Updated : 2017-07-10 18:33
NVD link : CVE-2017-7897
Mitre link : CVE-2017-7897
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
mantisbt
- mantisbt