First published: Mon Jan 03 2011(Updated: )
Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | <=1.2.3 | |
CentOS Libreport-plugin-mantisbt | =0.18.0 | |
CentOS Libreport-plugin-mantisbt | =0.19.0 | |
CentOS Libreport-plugin-mantisbt | =0.19.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =0.19.0a1 | |
CentOS Libreport-plugin-mantisbt | =0.19.0a2 | |
CentOS Libreport-plugin-mantisbt | =0.19.1 | |
CentOS Libreport-plugin-mantisbt | =0.19.2 | |
CentOS Libreport-plugin-mantisbt | =0.19.3 | |
CentOS Libreport-plugin-mantisbt | =0.19.4 | |
CentOS Libreport-plugin-mantisbt | =0.19.5 | |
CentOS Libreport-plugin-mantisbt | =1.0.0 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc3 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc4 | |
CentOS Libreport-plugin-mantisbt | =1.0.0-rc5 | |
CentOS Libreport-plugin-mantisbt | =1.0.0a1 | |
CentOS Libreport-plugin-mantisbt | =1.0.0a2 | |
CentOS Libreport-plugin-mantisbt | =1.0.0a3 | |
CentOS Libreport-plugin-mantisbt | =1.0.1 | |
CentOS Libreport-plugin-mantisbt | =1.0.2 | |
CentOS Libreport-plugin-mantisbt | =1.0.3 | |
CentOS Libreport-plugin-mantisbt | =1.0.4 | |
CentOS Libreport-plugin-mantisbt | =1.0.5 | |
CentOS Libreport-plugin-mantisbt | =1.0.6 | |
CentOS Libreport-plugin-mantisbt | =1.0.7 | |
CentOS Libreport-plugin-mantisbt | =1.0.8 | |
CentOS Libreport-plugin-mantisbt | =1.1.0 | |
CentOS Libreport-plugin-mantisbt | =1.1.1 | |
CentOS Libreport-plugin-mantisbt | =1.1.2 | |
CentOS Libreport-plugin-mantisbt | =1.1.4 | |
CentOS Libreport-plugin-mantisbt | =1.1.5 | |
CentOS Libreport-plugin-mantisbt | =1.1.6 | |
CentOS Libreport-plugin-mantisbt | =1.1.7 | |
CentOS Libreport-plugin-mantisbt | =1.1.8 | |
CentOS Libreport-plugin-mantisbt | =1.2.0 | |
CentOS Libreport-plugin-mantisbt | =1.2.1 | |
CentOS Libreport-plugin-mantisbt | =1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4350 is categorized as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2010-4350, upgrade MantisBT to version 1.2.4 or later, which addresses the directory traversal vulnerability.
CVE-2010-4350 allows remote attackers to include and execute arbitrary local files, leading to potential system compromise.
All MantisBT versions prior to 1.2.4, including versions 0.18.0 through 1.2.3, are affected by CVE-2010-4350.
Yes, CVE-2010-4350 is related to an unsafe call to a function in the ADOdb Library for PHP present in MantisBT.