Summary
Mantis is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user.
Other attacks are also possible.
Mantis 1.2.1 is vulnerable
other versions may also be affected.
Solution
Updates are available
please see the references for more information.
References
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache Tomcat Login Constraints Security Bypass Vulnerability
- Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability
- An Image Gallery Multiple Cross-Site Scripting Vulnerability
- Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
- Annuaire PHP 'sites_inscription.php' Cross Site Scripting Vulnerability