An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-30T20:26:59
Updated: 2024-08-04T15:33:05.625Z
Reserved: 2020-09-13T00:00:00
Link: CVE-2020-25288
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-09-30T21:15:13.167
Modified: 2024-11-21T05:17:52.487
Link: CVE-2020-25288
Redhat
No data.