Summary
This host is installed with MantisBT and is prone to multiple cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attacker to execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
Impact Level: Application
Solution
Upgrade to MantisBT version 1.2.13 or later.
For updates refer to http://www.mantisbt.org/download.php
Insight
Multiple flaws exists due to,
- Input passed via the 'name' parameter to manage_proj_cat_add.php script when creating a category is not properly sanitised in core/summary_api.php script before being used.
- Input passed to the 'match_type' POST parameter in bugs/search.php script is not properly sanitised before being returned to the user.
Affected
MantisBT version 1.2.12, prior versions may also be affected.
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
- http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html
- http://secunia.com/advisories/51853
- http://www.mantisbt.org/bugs/view.php?id=15373
- http://www.mantisbt.org/bugs/view.php?id=15384
- http://www.osvdb.com/89345
- http://www.osvdb.com/95072
- http://xforce.iss.net/xforce/xfdb/81394
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-0197, CVE-2013-1810 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities