Summary
Mantis is prone to a local file-include vulnerability because it fails to properly sanitize user supplied input. Input passed thru the 'db_type' parameter (GET & POST) to upgrade_unattended.php script is not properly verified before being used to include files.
Mantis is also prone to a cross-site scripting
attack.
References
Severity
Classification
-
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Open For Business HTML injection vulnerability
- @Mail 'MailType' Parameter Cross Site Scripting Vulnerability
- AMSI 'file' Parameter Directory Traversal Vulnerability
- A4Desk Event Calendar 'eventid' Parameter SQL Injection Vulnerability
- Alt-N WebAdmin Remote Source Code Information Disclosure Vulnerability