CVE-2020-25288
Published on: 09/30/2020 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:23:31 PM UTC
Certain versions of Mantisbt from Mantisbt contain the following vulnerability:
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
- CVE-2020-25288 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.8 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | HIGH | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | LOW | LOW | NONE |
CVSS2 Score: 3.5 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
0027275: CVE-2020-25288: HTML Injection on bug_update_page.php - MantisBT | Exploit Patch Vendor Advisory mantisbt.org text/html |
![]() |
Fix XSS in Custom Field regex pattern validation · mantisbt/[email protected] · GitHub | Patch Third Party Advisory github.com text/html |
![]() |
Related QID Numbers
- 690364 Free Berkeley Software Distribution (FreeBSD) Security Update for mantis (19259833-26b1-11eb-a239-1c697a013f4b)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Mantisbt | Mantisbt | All | All | All | All |
Application | Mantisbt | Mantisbt | All | All | All | All |
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*:
- cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE