Family: CGI abuses --> Category: infos
Mantis Multiple Flaws (4) Vulnerability Scan
Vulnerability Scan Summary
Checks for the version of Mantis
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP application that is affected by
According to its banner, the version of Mantis on the remote host fails
to sanitize user-supplied input to the 'g_db_type' parameter of the
'core/database_api.php' script. Provided PHP's 'register_globals'
setting is enabled, a possible hacker may be able to exploit this to connect
to arbitrary databases as well as scan for arbitrary open ports, even on
an internal network. In addition, it is reportedly prone to multiple
cross-site scripting issues.
See also :
Upgrade to Mantis 1.0.0rc2 or newer.
Low / CVSS Base Score : 2
Click HERE for more information and discussions on this network vulnerability scan.