An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
References
Link | Resource |
---|---|
http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c | Patch Third Party Advisory |
https://mantisbt.org/bugs/view.php?id=27275 | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-30T20:26:59
Updated: 2020-09-30T20:26:59
Reserved: 2020-09-13T00:00:00
Link: CVE-2020-25288
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-30T21:15:13.167
Modified: 2020-10-13T17:47:38.790
Link: CVE-2020-25288
JSON object: View
Redhat Information
No data.
CWE