{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2017-7241","title":"Title"},{"category":"description","text":"A cross-site scripting (XSS) vulnerability in the MantisBT Move Attachments page (move_attachments_page.php, part of admin tools) allows remote attackers to inject arbitrary code through a crafted 'type' parameter, if Content Security Protection (CSP) settings allows it. This is fixed in 1.3.9, 2.1.3, and 2.2.3. Note that this vulnerability is not exploitable if the admin tools directory is removed, as recommended in the \"Post-installation and upgrade tasks\" of the MantisBT Admin Guide. A reminder to do so is also displayed on the login page.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2017-7241","url":"https://www.suse.com/security/cve/CVE-2017-7241"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1031807 for CVE-2017-7241","url":"https://bugzilla.suse.com/1031807"}],"title":"SUSE CVE CVE-2017-7241","tracking":{"current_release_date":"2025-02-18T07:50:41Z","generator":{"date":"2023-02-15T04:48:07Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2017-7241","initial_release_date":"2023-02-15T04:48:07Z","revision_history":[{"date":"2023-02-15T04:48:07Z","number":"2","summary":"Current version"},{"date":"2025-01-01T09:03:50Z","number":"3","summary":"Current version"},{"date":"2025-02-18T07:50:41Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}