5
CVSSv2

CVE-2010-4349

Published: 03/01/2011 Updated: 17/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

admin/upgrade_unattended.php in MantisBT prior to 1.2.4 allows remote malicious users to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

Vulnerable Product Search on Vulmon Subscribe to Product

mantisbt mantisbt 1.1.6

mantisbt mantisbt 1.1.7

mantisbt mantisbt 1.0.5

mantisbt mantisbt 1.0.3

mantisbt mantisbt 0.19.4

mantisbt mantisbt 0.18.0

mantisbt mantisbt 1.0.0a1

mantisbt mantisbt 1.0.0a2

mantisbt mantisbt 1.1.8

mantisbt mantisbt 1.2.0

mantisbt mantisbt 1.0.6

mantisbt mantisbt 1.0.7

mantisbt mantisbt 1.0.4

mantisbt mantisbt

mantisbt mantisbt 0.19.3

mantisbt mantisbt 0.19.1

mantisbt mantisbt 0.19.2

mantisbt mantisbt 1.0.0

mantisbt mantisbt 0.19.5

mantisbt mantisbt 1.1.1

mantisbt mantisbt 1.1.4

mantisbt mantisbt 1.1.5

mantisbt mantisbt 1.0.2

mantisbt mantisbt 1.0.1

mantisbt mantisbt 0.19.0a1

mantisbt mantisbt 0.19.0a2

mantisbt mantisbt 1.0.0a3

mantisbt mantisbt 1.1.2

mantisbt mantisbt 1.2.1

mantisbt mantisbt 1.0.8

mantisbt mantisbt 1.1.0

mantisbt mantisbt 1.2.2

mantisbt mantisbt 0.19.0

Exploits

MantisBT <=123 (db_type) Cross-Site Scripting & Path Disclosure Vulnerability Vendor: MantisBT Group Product web page: wwwmantisbtorg Version affected: <124 Summary: MantisBT is a free popular web-based bugtracking system It is written in the PHP scripting language and works with MySQL, MS SQL, and PostgreSQL datab ...