First published: Fri Mar 31 2017(Updated: )
A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the "Post-installation and upgrade tasks" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | =1.2.16 | |
CentOS Libreport-plugin-mantisbt | =1.2.17 | |
CentOS Libreport-plugin-mantisbt | =1.2.18 | |
CentOS Libreport-plugin-mantisbt | =1.2.19 | |
CentOS Libreport-plugin-mantisbt | =1.2.20 | |
CentOS Libreport-plugin-mantisbt | =1.3.0-beta1 | |
CentOS Libreport-plugin-mantisbt | =1.3.0-beta2 | |
CentOS Libreport-plugin-mantisbt | =1.3.0-beta3 | |
CentOS Libreport-plugin-mantisbt | =1.3.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.3.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.3.1 | |
CentOS Libreport-plugin-mantisbt | =1.3.2 | |
CentOS Libreport-plugin-mantisbt | =1.3.3 | |
CentOS Libreport-plugin-mantisbt | =1.3.4 | |
CentOS Libreport-plugin-mantisbt | =1.3.5 | |
CentOS Libreport-plugin-mantisbt | =1.3.6 | |
CentOS Libreport-plugin-mantisbt | =1.3.7 | |
CentOS Libreport-plugin-mantisbt | =1.3.8 | |
CentOS Libreport-plugin-mantisbt | =1.3.9 | |
CentOS Libreport-plugin-mantisbt | =2.0.0 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-beta1 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-beta2 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-beta3 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =2.0.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =2.0.1 | |
CentOS Libreport-plugin-mantisbt | =2.1.0 | |
CentOS Libreport-plugin-mantisbt | =2.1.1 | |
CentOS Libreport-plugin-mantisbt | =2.1.2 | |
CentOS Libreport-plugin-mantisbt | =2.1.3 | |
CentOS Libreport-plugin-mantisbt | =2.2.0 | |
CentOS Libreport-plugin-mantisbt | =2.2.1 | |
CentOS Libreport-plugin-mantisbt | =2.2.2 | |
CentOS Libreport-plugin-mantisbt | =2.2.3 | |
CentOS Libreport-plugin-mantisbt | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7241 is classified as a medium severity cross-site scripting (XSS) vulnerability.
To fix CVE-2017-7241, upgrade MantisBT to version 1.3.9 or later.
CVE-2017-7241 affects MantisBT versions from 1.2.16 to 1.3.8 and includes several beta and release candidates.
Exploiting CVE-2017-7241 allows remote attackers to inject arbitrary code into the Move Attachments page, potentially leading to further attacks.
If upgrading is not possible, implementing stricter Content Security Policy (CSP) settings may mitigate some risks associated with CVE-2017-7241.