5.1
CVSSv2

CVE-2010-4350

Published: 03/01/2011 Updated: 27/08/2013
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT prior to 1.2.4 allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

Vulnerable Product Search on Vulmon Subscribe to Product

mantisbt mantisbt 1.1.7

mantisbt mantisbt 1.1.4

mantisbt mantisbt 1.0.3

mantisbt mantisbt 1.0.2

mantisbt mantisbt 0.18.0

mantisbt mantisbt 0.19.0a1

mantisbt mantisbt 1.0.0a2

mantisbt mantisbt 1.0.0a3

mantisbt mantisbt 1.0.0

mantisbt mantisbt 1.2.0

mantisbt mantisbt 1.1.6

mantisbt mantisbt 1.0.4

mantisbt mantisbt 1.0.5

mantisbt mantisbt 0.19.3

mantisbt mantisbt 0.19.4

mantisbt mantisbt 0.19.2

mantisbt mantisbt 1.0.0a1

mantisbt mantisbt 0.19.5

mantisbt mantisbt 1.1.1

mantisbt mantisbt 1.1.2

mantisbt mantisbt 1.1.5

mantisbt mantisbt 1.0.8

mantisbt mantisbt 1.1.0

mantisbt mantisbt 1.0.1

mantisbt mantisbt 0.19.0a2

mantisbt mantisbt 0.19.0

mantisbt mantisbt 1.2.1

mantisbt mantisbt 1.1.8

mantisbt mantisbt 1.0.6

mantisbt mantisbt 1.0.7

mantisbt mantisbt 1.2.2

mantisbt mantisbt

mantisbt mantisbt 0.19.1

Exploits

MantisBT <=123 (db_type) Local File Inclusion Vulnerability Vendor: MantisBT Group Product web page: wwwmantisbtorg Version affected: <124 Summary: MantisBT is a free popular web-based bugtracking system It is written in the PHP scripting language and works with MySQL, MS SQL, and PostgreSQL databases and a webserver ...