Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 - Exploit, Patch | |
References | () http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html - Exploit | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html - Exploit, Patch | |
References | () http://secunia.com/advisories/51199 - | |
References | () http://security.gentoo.org/glsa/glsa-201211-01.xml - | |
References | () http://securityreason.com/securityalert/8392 - | |
References | () http://www.mantisbt.org/bugs/view.php?id=13191 - Exploit | |
References | () http://www.mantisbt.org/bugs/view.php?id=13281 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2011/09/04/1 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2011/09/09/9 - Exploit | |
References | () http://www.securityfocus.com/archive/1/519547/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/49448 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=735514 - Exploit, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/69587 - | |
References | () https://github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034 - Patch | |
References | () https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html - Exploit |
Information
Published : 2011-09-21 16:55
Updated : 2024-11-21 01:30
NVD link : CVE-2011-3356
Mitre link : CVE-2011-3356
CVE.ORG link : CVE-2011-3356
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')