Cross-site scripting in MantisBT - CVE-2011-3356
Published: September 21, 2011 / Updated: January 3, 2021
MantisBT
mantisbt.sourceforge.net
Description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in config_defaults_inc.php in MantisBT before 1.2.8 when processing the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297
- http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html
- http://secunia.com/advisories/51199
- http://security.gentoo.org/glsa/glsa-201211-01.xml
- http://securityreason.com/securityalert/8392
- http://www.mantisbt.org/bugs/view.php?id=13191
- http://www.mantisbt.org/bugs/view.php?id=13281
- http://www.openwall.com/lists/oss-security/2011/09/04/1
- http://www.openwall.com/lists/oss-security/2011/09/09/9
- http://www.securityfocus.com/archive/1/519547/100/0/threaded
- http://www.securityfocus.com/bid/49448
- https://bugzilla.redhat.com/show_bug.cgi?id=735514
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69587
- https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034
- https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html