Vulnerability Description
The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document's page.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mantisbt | Mantisbt | < 2.21.3 |
Related Weaknesses (CWE)
References
- https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a9PatchThird Party Advisory
- https://mantisbt.org/bugs/view.php?id=26078Permissions RequiredVendor Advisory
- https://github.com/mantisbt/mantisbt/commit/bd094dede74ff6e313e286e949e2387233a9PatchThird Party Advisory
- https://mantisbt.org/bugs/view.php?id=26078Permissions RequiredVendor Advisory
FAQ
What is CVE-2019-15539?
CVE-2019-15539 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit i...
How severe is CVE-2019-15539?
CVE-2019-15539 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15539?
Check the references section above for vendor advisories and patch information. Affected products include: Mantisbt Mantisbt.