Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

MantisBT 1.2.13 < 1.2.18 XSS

Medium

Synopsis

The remote web server is hosting an outdated web application that is vulnerable to multiple cross-site scripting attacks.

Description

The remote web server is hosting MantisBT, an open source bug tracking application written in PHP.

Versions of MantisBT 1.2.13 prior to 1.2.18 are affected by two cross-site scripting vulnerabilities in the 'adm_config_report.php' script due to lack of user input sanitization. Special characters such as double quotes or < and > are not filtered before being reflected. Additionally, user-supplied input submitted to the 'config_option' parameter is not checked for validity when passed to the script. This could allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between the browser and server.

Solution

Upgrade to MantisBT 1.2.18 or later.