Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-4349

Опубликовано: 03 янв. 2011
Источник: nvd
CVSS2: 5
EPSS Средний

Описание

admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
Версия до 1.2.3 (включая)
cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 93%
0.1183
Средний

5 Medium

CVSS2

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 15 лет назад

admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

debian
почти 15 лет назад

admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote at ...

github
больше 3 лет назад

admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

EPSS

Процентиль: 93%
0.1183
Средний

5 Medium

CVSS2

Дефекты

CWE-200