Mantisbt

Mantisbt

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.28%
  • Veröffentlicht 23.02.2023 19:15:13
  • Zuletzt bearbeitet 21.11.2024 07:44:52

Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having ...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 24.06.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 07:08:35

An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead o...

Exploit
  • EPSS 1.45%
  • Veröffentlicht 04.05.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:57:27

An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.

Exploit
  • EPSS 1.2%
  • Veröffentlicht 14.04.2022 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:28:56

Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel.

  • EPSS 0.87%
  • Veröffentlicht 13.04.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:53:31

An XSS issue was discovered in MantisBT before 2.25.3. Improper escaping of a Plugin name allows execution of arbitrary code (if CSP allows it) in manage_plugin_page.php and manage_plugin_uninstall.php when a crafted plugin is installed.

Exploit
  • EPSS 0.93%
  • Veröffentlicht 17.06.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:09:05

An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 07.03.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 01:03:53

An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access...

  • EPSS 0.29%
  • Veröffentlicht 22.02.2021 03:15:14
  • Zuletzt bearbeitet 21.11.2024 05:27:36

An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 29.01.2021 07:15:17
  • Zuletzt bearbeitet 21.11.2024 05:24:17

In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects' names via the manage_proj_edit_page.php project_id parameter, without having access to them.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 29.01.2021 07:15:17
  • Zuletzt bearbeitet 21.11.2024 05:24:18

An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any priv...