CVE-2010-4349 – Mantis Bug Tracker 1.2.3 - 'db_type' Cross-Site Scripting / Full Path Disclosure
https://notcve.org/view.php?id=CVE-2010-4349
admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP. admin / upgrade_unattended.php en MantisBT anterior a v1.2.4 permite a atacantes remotos obtener información sensible a través de un parámetro db_type no válido, lo cual revela la ruta de instalación en un mensaje de error, relacionado con una llamada insegura por MantisBT a una función en la Biblioteca ADOdb para PHP . • https://www.exploit-db.com/exploits/15735 http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html http://openwall.com/lists/oss-security/2010/12/15/4 http://openwall.com/lists/oss-security/2010/12/16/1 http://secunia.com/advisories/42772 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.mantisbt.org/blog/?p=123 htt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2010-4350 – Mantis Bug Tracker 1.2.3 - 'db_type' Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-4350
Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP. Vulnerabilidad de salto de directorio en admin / upgrade_unattended.php en MantisBT antes de 1.2.4 permite a atacantes remotos incluir y ejecutar archivos locales a través de un .. (punto punto) en el parámetro db_type, relacionado con una llamada insegura por MantisBT a una función en la Biblioteca ADOdb para PHP. • https://www.exploit-db.com/exploits/15736 http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html http://openwall.com/lists/oss-security/2010/12/15/5 http://openwall.com/lists/oss-security/2010/12/16/2 http://secunia.com/advisories/42772 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.mantisbt.org/blog/?p=123 htt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-4348 – Mantis Bug Tracker 1.2.3 - 'db_type' Cross-Site Scripting / Full Path Disclosure
https://notcve.org/view.php?id=CVE-2010-4348
Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en admin / upgrade_unattended.php en MantisBT antes de 1.2.4 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro db_type, relacionado con una llamada insegura por MantisBT a una función en la Biblioteca ADOdb para PHP. • https://www.exploit-db.com/exploits/15735 http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html http://openwall.com/lists/oss-security/2010/12/15/4 http://openwall.com/lists/oss-security/2010/12/16/1 http://secunia.com/advisories/42772 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.mantisbt.org/blog/?p=123 htt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2010-3763
https://notcve.org/view.php?id=CVE-2010-3763
Cross-site scripting (XSS) vulnerability in core/summary_api.php in MantisBT before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via the Summary field, a different vector than CVE-2010-3303. Una vulnerabilidad de ejecución de comandos en sitios cruzados en core/summary_api.php en MantisBT antes de la versión v1.2.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del campo de 'Summary'. Se trata de un problema diferente al de CVE-2010-3303. • http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052721.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052730.html http://secunia.com/advisories/42772 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.mantisbt.org/blog/?p=123 http://www.mantisbt.org/bugs/changelog_page.php?version_id=111 http://www.mantisbt.org/bugs/view.php?id=12309 http://www.openwall.com/lists/oss-security/201 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2010-3303
https://notcve.org/view.php?id=CVE-2010-3303
Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.3 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) a plugin name, related to manage_plugin_uninstall.php; (2) an enumeration value or (3) a String value of a custom field, related to core/cfdefs/cfdef_standard.php; or a (4) project or (5) category name to print_all_bug_page_word.php. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en MantisBT antes de v1.2.3 permiten a un administrador remoto autenticado inyectar secuencias de comandos web o HTML a través de (1) un nombre de plugin, relacionado con manage_plugin_uninstall.php, (2) un valor de enumeración o (3) un valor de cadena de un campo personalizado, relacionado con el core/cfdefs/cfdef_standard.php, o (4) un nombre de proyecto o (5) un nombre de categoría en print_all_bug_page_word.php. • http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048548.html http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048639.html http://lists.fedoraproject.org/pipermail/package-announce/2010-September/048659.html http://secunia.com/advisories/41653 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.mantisbt.org/bugs/changelog_page.php?version_id=111 http://www.mantisbt.org/bugs/view.php?id=12231 http://w • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •