View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0004044 | mantisbt | security | public | 2004-07-08 12:22 | 2016-05-26 13:51 |
Reporter | joxeanpiti | Assigned To | int2str | ||
Priority | urgent | Severity | major | Reproducibility | always |
Status | closed | Resolution | fixed | ||
Product Version | 0.19.0a1 | ||||
Fixed in Version | 0.19.0a2 | ||||
Summary | 0004044: Cross Site Scripting Vulnerability | ||||
Description | I found a simple XSS vulnerability, but may be more. Please try the following URL : http://bugs.mantisbt.org/login_page.php?return=%22%3E%3Cscript%3Ealert('Hello')%3C/script%3E or this | ||||
Additional Information | It is easy to correct it. You need to correctly sanitize ALL the user parameters that are passed. | ||||
Tags | No tags attached. | ||||
This should be fixed in 0.19.0a2. |
|
By the way, if you have a fix, please post it here. This will save us sometime. |
|
I don't have a fix, but it is "easy". You need to correctly sanitize the passed strings when you shows these strings. |
|
Checked in a fix for some obvious ones (including the one mentionen in the bug). A more thorough security strategy should be layed out for the future. |
|
MantisBT: master 8b7fcd3a 2004-07-09 20:29 int2str Details Diff |
* Fix 0004044: Cross Site Scripting Vulnerability git-svn-id: http://mantisbt.svn.sourceforge.net/svnroot/mantisbt/trunk@2679 <a class="text" href="/?p=mantisbt.git;a=object;h=f5dc347c">f5dc347c</a>-c33d-0410-90a0-b07cc1902cb9 |
Affected Issues 0004044 |
|
mod - login.php | Diff File | ||
mod - manage_custom_field_delete.php | Diff File | ||
mod - login_cookie_test.php | Diff File | ||
mod - doc/ChangeLog | Diff File | ||
mod - login_page.php | Diff File | ||
mod - manage_custom_field_edit_page.php | Diff File | ||
mod - manage_custom_field_update.php | Diff File |