A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value.
References
Link | Resource |
---|---|
http://www.debian.org/security/2015/dsa-3120 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/04/09/1 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934 | Issue Tracking Patch Third Party Advisory |
https://mantisbt.org/bugs/view.php?id=15416 | Issue Tracking Vendor Advisory |
https://security-tracker.debian.org/tracker/CVE-2013-1934 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3120 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/04/09/1 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934 | Issue Tracking Patch Third Party Advisory |
https://mantisbt.org/bugs/view.php?id=15416 | Issue Tracking Vendor Advisory |
https://security-tracker.debian.org/tracker/CVE-2013-1934 | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2015/dsa-3120 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2013/04/09/1 - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1934 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://mantisbt.org/bugs/view.php?id=15416 - Issue Tracking, Vendor Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2013-1934 - Third Party Advisory |
Information
Published : 2019-10-31 20:15
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1934
Mitre link : CVE-2013-1934
CVE.ORG link : CVE-2013-1934
JSON object : View
Products Affected
debian
- debian_linux
mantisbt
- mantisbt
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')