First published: Fri Mar 31 2017(Updated: )
A cross-site scripting (XSS) vulnerability in the MantisBT Configuration Report page (adm_config_report.php) allows remote attackers to inject arbitrary code through a crafted 'action' parameter. This is fixed in 1.3.8, 2.1.2, and 2.2.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | =1.3.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.3.1 | |
CentOS Libreport-plugin-mantisbt | =1.3.2 | |
CentOS Libreport-plugin-mantisbt | =1.3.3 | |
CentOS Libreport-plugin-mantisbt | =1.3.4 | |
CentOS Libreport-plugin-mantisbt | =1.3.5 | |
CentOS Libreport-plugin-mantisbt | =1.3.6 | |
CentOS Libreport-plugin-mantisbt | =1.3.7 | |
CentOS Libreport-plugin-mantisbt | =1.3.8 | |
CentOS Libreport-plugin-mantisbt | =1.3.9 | |
CentOS Libreport-plugin-mantisbt | =2.0.0 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-beta1 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-beta2 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-beta3 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =2.0.1 | |
CentOS Libreport-plugin-mantisbt | =2.1.0 | |
CentOS Libreport-plugin-mantisbt | =2.1.1 | |
CentOS Libreport-plugin-mantisbt | =2.1.2 | |
CentOS Libreport-plugin-mantisbt | =2.1.3 | |
CentOS Libreport-plugin-mantisbt | =2.2.0 | |
CentOS Libreport-plugin-mantisbt | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6973 is classified as a high severity cross-site scripting vulnerability that can allow attackers to inject malicious code.
To remediate CVE-2017-6973, upgrade to MantisBT version 1.3.8, 2.1.2, or 2.2.2 or later.
CVE-2017-6973 affects MantisBT versions from 1.3.0-rc2 through 1.3.7 and various 2.0.x versions prior to 2.1.2.
CVE-2017-6973 is a cross-site scripting (XSS) vulnerability targeting the adm_config_report.php page.
Yes, CVE-2017-6973 can lead to data breaches by allowing unauthorized code execution on user sessions.