Mantis MantisBT Cross-Site Scripting Vulnerability
Description
(:A vulnerability has been identified in MantisBT.:A remote attacker could exploit it in order to execute arbitrary JavaScript or HTML code by inciting their victim into following a specially formed link.::No further information is available.)
Vulnerable Products
Vulnerable Software:
MantisBT (Mantis) - 1.3.0, 1.3.0-beta.1, 1.3.0-beta.2, 1.3.0-rc1
Solution
A patch is available on the official GIT of MantisBT.
CVE
CVE-2015-2046
References
- fortiguard : MantisBT Cross-Site Scripting (XSS) Vulnerability
http://www.fortiguard.com/advisory/fortinet-discovers-mantisbt-cross-site-scripting-xss-vulnerability
Vulnerability Manager Detection
No
IPS Protection
ASQ Engine alarm
Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
Risk level
Moderate
Vulnerability First Public Report Date
2015-10-19
Target Type
Client
Possible exploit
Remote