An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
References
Link | Resource |
---|---|
http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d | Patch Third Party Advisory |
https://mantisbt.org/bugs/view.php?id=27304 | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-30T20:33:43
Updated: 2020-09-30T20:33:43
Reserved: 2020-09-23T00:00:00
Link: CVE-2020-25830
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-30T21:15:13.293
Modified: 2020-10-13T18:10:33.380
Link: CVE-2020-25830
JSON object: View
Redhat Information
No data.
CWE