Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-4350

Опубликовано: 03 янв. 2011
Источник: nvd
CVSS2: 5.1
EPSS Средний

Описание

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
Версия до 1.2.3 (включая)
cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 93%
0.10217
Средний

5.1 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

ubuntu
почти 15 лет назад

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

debian
почти 15 лет назад

Directory traversal vulnerability in admin/upgrade_unattended.php in M ...

github
больше 3 лет назад

Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.

EPSS

Процентиль: 93%
0.10217
Средний

5.1 Medium

CVSS2

Дефекты

CWE-22