fkie_cve-2006-0841
Vulnerability from fkie_nvd
Published
2006-02-22 02:02
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Mantis 1.00rc4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) hide_status, (2) handler_id, (3) user_monitor, (4) reporter_id, (5) view_type, (6) show_severity, (7) show_category, (8) show_status, (9) show_resolution, (10) show_build, (11) show_profile, (12) show_priority, (13) highlight_changed, (14) relationship_type, and (15) relationship_bug parameters in (a) view_all_set.php; the (16) sort parameter in (b) manage_user_page.php; the (17) view_type parameter in (c) view_filters_page.php; and the (18) title parameter in (d) proj_doc_delete.php. NOTE: item 17 might be subsumed by CVE-2005-4522.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantis:mantis:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0266C2F7-FB20-44EF-B0BB-ECCF055D03A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B5E88349-E374-4AE9-9C4E-9599C1448D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A21FF02F-982C-429F-A14D-D6E18058DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "9407F704-FF3C-4976-BE4C-A1DDC16715D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "99FB3D29-644D-4E5F-875D-C87CCE3EF95C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A5173B32-1099-47C9-996B-56DB29456BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6CA26FD-9C45-4628-82B7-E37E3EA3E2A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "7B9B4611-C002-40F5-978C-BB90F1A893C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "B419B788-ADDD-4C0A-8E02-CBB58FD21938", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C7C8B5A-A630-4EDD-A6E8-27D2E1139CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "B347D6C8-4607-481D-863E-7F41E9868041", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E387645-BC7A-4EA5-AE9E-A3C66994391B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "4F434D16-4F09-4BCF-BD3E-9114876C2575", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "C80575A3-87E7-40BC-9BCB-E12BB7938A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6D8FD23-C9A3-40AB-B3ED-86739BA8A362", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "72BD480B-7CFB-4FD3-8E47-028F32AEF902", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "04989B5F-30B2-43A0-A061-BF43EEA8756C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC7C781D-F5D1-4C63-B6E3-230DEC80104E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0755FA0-2365-42B4-8E42-214D5BAD71A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "35248DDA-D37D-4D72-9FF8-6813BA4C87BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "A67C54F4-4155-43DA-8E07-579249759989", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "9DE7BEF1-1522-4666-B6B1-36A308FBC0A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.6:*:*:*:*:*:*:*", "matchCriteriaId": "C376D216-914A-4D96-8603-C6861B3E2857", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.7:*:*:*:*:*:*:*", "matchCriteriaId": "CF0636CA-49A5-4463-B22B-6C5E1E2D44AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.14.8:*:*:*:*:*:*:*", "matchCriteriaId": "E3A07B4C-CE12-4381-BFE4-CE79411F5069", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "DB6E1BE3-BF57-4ED4-918D-8B23CB195ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "065C222C-638F-4303-BE6A-7FED59E21FB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB502B29-FBC5-4984-A735-AA0B6DF4A58D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F759138-7079-471F-B30D-ED62351CFCB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "3A62328B-4C77-4FF4-B1D9-BE4A2E5C61FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DAFD163-7FE7-48FB-8860-7B00B0FFA628", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "7C074DBE-AFC9-4094-A170-A31D79C139D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "53520AA0-E5AB-450A-9D95-E075B552D2E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*", "matchCriteriaId": "4D77F95A-0059-4442-8D9D-AA7F101FBBE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "E0BC255D-6B0F-412D-B639-B9F9656E4839", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "70450FAB-7886-418E-B471-8F16A68F9658", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "4B4CFE80-223F-45DA-A9FB-03474F61E027", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "B29FF305-E773-497E-9C47-7D87383F1440", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "8724300D-CBDC-4C66-BF78-038F838C06DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "B7283A58-EE8E-493F-8E51-C97FF87ECA16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*", "matchCriteriaId": "E3CF3162-EAF8-438C-891A-FD13ECF6D6A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E42F3A0-5FDB-4053-9EA5-D19B7061CDE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "101BF6DC-0F73-41E0-A0EE-BA1EA7397423", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCC458D9-12B1-4CF1-980E-BC86E874BBA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.18a1:*:*:*:*:*:*:*", "matchCriteriaId": "2202C65A-33FB-4742-8706-2BDD5B442030", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "5419E3AC-4215-4584-9538-AF790DC9BD5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "D3C48B8F-633E-4D69-A174-26C19829DE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0a:*:*:*:*:*:*:*", "matchCriteriaId": "C1E7658F-A543-46F5-B79D-E0E25B7C574F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "DD259C18-7111-45C9-B6C3-6A5F29998146", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA3B4B-D7E6-4555-969F-66217ACDACDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "38BFDCFA-00C8-4B6A-B758-8FD15A122CA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "6770FDC6-792D-49B2-942B-282F9012D0BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D8E7458-6655-4C86-85A9-81004FF38321", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "AE92E018-C25C-468D-9EF5-5665F0B42EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "C6DB707C-29DF-442C-BBBE-650182692A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "0C420189-4748-465C-96FE-DC89502F7E26", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "3B3A1BAC-F777-413E-BFB7-972C687C2D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*", "matchCriteriaId": "B0C7EDA7-1BED-4152-BD3D-3A596482D9D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*", "matchCriteriaId": "730BE023-C283-4775-915C-79817723917A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*", "matchCriteriaId": "337E18A7-07A3-456D-868A-2002F96D7A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*", "matchCriteriaId": "84B09B6D-EE4D-4241-B3EF-CBCB03A7F579", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Mantis 1.00rc4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) hide_status, (2) handler_id, (3) user_monitor, (4) reporter_id, (5) view_type, (6) show_severity, (7) show_category, (8) show_status, (9) show_resolution, (10) show_build, (11) show_profile, (12) show_priority, (13) highlight_changed, (14) relationship_type, and (15) relationship_bug parameters in (a) view_all_set.php; the (16) sort parameter in (b) manage_user_page.php; the (17) view_type parameter in (c) view_filters_page.php; and the (18) title parameter in (d) proj_doc_delete.php. NOTE: item 17 might be subsumed by CVE-2005-4522." } ], "id": "CVE-2006-0841", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-22T02:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://morph3us.org/advisories/20060214-mantis-100rc4.txt" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21400" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/project/showfiles.php?group_id=14963\u0026package_id=12175\u0026release_id=386059" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=386059\u0026group_id=14963" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-1133" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22487" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23248" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/425046/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://morph3us.org/advisories/20060214-mantis-100rc4.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/project/showfiles.php?group_id=14963\u0026package_id=12175\u0026release_id=386059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=386059\u0026group_id=14963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23248" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/425046/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16657" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…