MantisBT <=1.2.3 (db_type) Local File Inclusion Vulnerability

Summary
Mantis is prone to a local file-include vulnerability because it fails to properly sanitize user supplied input. Input passed thru the 'db_type' parameter (GET & POST) to upgrade_unattended.php script is not properly verified before being used to include files. Mantis is also prone to a cross-site scripting attack.
References