MantisBT 1.2.13 <= 1.2.19 XSS

low Nessus Network Monitor Plugin ID 8678

Synopsis

The remote web server is hosting an outdated web application that is vulnerable to multiple cross-site scripting attacks.

Description

The remote web server is hosting MantisBT, an open source bug tracking application written in PHP.

Versions of MantisBT 1.2.13 through 1.2.19 are affected by two cross-site scripting vulnerabilities in the 'adm_config_report.php' script due to lack of user input sanitization. Specifically, this issue affects the 'filter_config_id' parameter of the 'adm_config_report.php' script. Additionally, user-supplied input when saving form variable filters are not checked for validity when passed to the script. This could allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between the browser and server.

Solution

Upgrade to MantisBT 1.2.20 or later.

See Also

https://www.mantisbt.org

http://www.nessus.org/u?9d88f9d1

http://www.mantisbt.org/bugs/view.php?id=19301

https://github.com/mantisbt/mantisbt/commit/6defeed5

Plugin Details

Severity: Low

ID: 8678

Family: CGI

Published: 4/8/2015

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mantisbt:mantisbt

Patch Publication Date: 2/9/2015

Vulnerability Publication Date: 2/9/2015

Reference Information

CVE: CVE-2015-2046

BID: 72548