MantisBT 1.2.x < 1.2.20 / 1.3.x < 1.3.0-rc.2 XSS

low Nessus Network Monitor Plugin ID 9891

Synopsis

The remote web server is hosting an outdated web application that is vulnerable to an information disclosure attack reflected cross-site scripting (XSS) attack vector.

Description

Versions of MantisBT 1.2.x prior to 1.2.20 or 1.3.x prior to 1.3.0-rc.2 are affected by a flaw that allows a XSS attack. This flaw exists because the 'manage_custom_field_edit_page.php' script does not validate input to the 'return' parameter before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Solution

Upgrade to MantisBT 1.3.0-rc.2 or later. If 1.3.x cannot be obtained, version 1.2.20 has also been patched.

See Also

https://www.mantisbt.org/bugs/view.php?id=21090

Plugin Details

Severity: Low

ID: 9891

Family: CGI

Published: 1/18/2017

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mantisbt:mantisbt

Patch Publication Date: 8/15/2016

Vulnerability Publication Date: 6/10/2016

Reference Information

CVE: CVE-2016-5364