A cross-site scripting (XSS) vulnerability in the MantisBT (2.3.x before 2.3.2) Timeline include page, used in My View (my_view_page.php) and User Information (view_user_page.php) pages, allows remote attackers to inject arbitrary code (if CSP settings permit it) through crafted PATH_INFO in a URL, due to use of unsanitized $_SERVER['PHP_SELF'] to generate URLs.
References
Link | Resource |
---|---|
http://www.mantisbt.org/bugs/view.php?id=22742 | Exploit Issue Tracking |
http://www.securitytracker.com/id/1038278 | |
https://github.com/mantisbt/mantisbt/commit/a1c719313d61b07bbe8700005807b8195fdc32f1 | Patch |
https://github.com/mantisbt/mantisbt/pull/1094 | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-04-18T17:00:00
Updated: 2017-07-10T09:57:01
Reserved: 2017-04-18T00:00:00
Link: CVE-2017-7897
JSON object: View
NVD Information
Status : Modified
Published: 2017-04-18T17:59:00.163
Modified: 2017-07-11T01:33:48.003
Link: CVE-2017-7897
JSON object: View
Redhat Information
No data.
CWE