Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297
lists.debian.org/debian-security-tracker/2011/09/msg00012.html
lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html
secunia.com/advisories/51199
security.gentoo.org/glsa/glsa-201211-01.xml
securityreason.com/securityalert/8392
www.mantisbt.org/bugs/view.php?id=13191
www.mantisbt.org/bugs/view.php?id=13281
www.openwall.com/lists/oss-security/2011/09/04/1
www.openwall.com/lists/oss-security/2011/09/09/9
www.securityfocus.com/archive/1/519547/100/0/threaded
www.securityfocus.com/bid/49448
bugzilla.redhat.com/show_bug.cgi?id=735514
exchange.xforce.ibmcloud.com/vulnerabilities/69587
github.com/mantisbt/mantisbt/commit/d00745f5e267eba4ca34286d125de685bc3a8034
www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html