MantisBT (Mantis Bug Tracker) is an open source issue tracker. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when resolving or closing issues (`bug_change_status_page.php`) belonging to a project linking said custom field, viewing issues (`view_all_bug_page.php`) when the custom field is displayed as a column, or printing issues (`print_all_bug_page.php`) when the custom field is displayed as a column. Version 2.26.2 contains a patch for the issue. As a workaround, ensure Custom Field Names do not contain HTML tags.
References
Configurations
No configuration.
History
21 Nov 2024, 09:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be - | |
References | () https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq - | |
References | () https://mantisbt.org/bugs/view.php?id=34432 - |
14 May 2024, 15:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 15:38
Updated : 2024-11-21 09:18
NVD link : CVE-2024-34081
Mitre link : CVE-2024-34081
CVE.ORG link : CVE-2024-34081
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')