Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62c5-j9g9-cmxr

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

EPSS

Процентиль: 93%
0.10217
Средний

Дефекты

CWE-22

Связанные уязвимости

ubuntu
почти 15 лет назад

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

nvd
почти 15 лет назад

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

debian
почти 15 лет назад

Directory traversal vulnerability in admin/upgrade_unattended.php in M ...

EPSS

Процентиль: 93%
0.10217
Средний

Дефекты

CWE-22