Description
|
|
Multiple vulnerabilities have been reported in MantisBT, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via certain parameters to the application (e.g. "project_id" parameter to search.php) is not properly sanitised before being returned to the user in core/filter_api.php. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in version 1.2.6. Prior versions may also be affected.
|