MantisBT 1.3.x < 1.3.8 / 2.1.x < 2.1.2 / 2.2.x < 2.2.2 XSS

low Nessus Network Monitor Plugin ID 700051

Synopsis

The remote web server is hosting an outdated web application that is vulnerable to a Cross-Site Scripting (XSS) attack vector.

Description

Versions of MantisBT 1.3.x prior to 1.3.8, 2.1.x prior to 2.1.2, and 2.2.x prior to 2.2.2 are affected by a flaw that allows a reflected XSS attack. This flaw exists because the 'adm_config_report.php' script does not validate input to the 'action GET' parameter before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that will execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Solution

Upgrade to MantisBT 2.2.2 or later. If version 2.2.x cannot be obtained, versions 2.1.2 and 1.3.8 have also been patched for this vulnerability.

See Also

https://github.com/mantisbt/mantisbt/commit/034cd07b47af37366fc7b726cb4a4f971d3d3fb9

https://github.com/mantisbt/mantisbt/commit/da74c5aa02bcf21cfaab1180f892c22415e5fea6

Plugin Details

Severity: Low

ID: 700051

Family: CGI

Published: 4/10/2017

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 3

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.1

Temporal Score: 3

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mantisbt:mantisbt

Patch Publication Date: 3/17/2017

Vulnerability Publication Date: 3/17/2017

Reference Information

CVE: CVE-2017-6973

BID: 97252