Lucene search

K
dsquareDsquare SecurityE-12
HistoryFeb 01, 2012 - 12:00 a.m.

Mantis <= 1.1.1 LFI

2012-02-0100:00:00
Dsquare Security
42

0.01 Low

EPSS

Percentile

83.4%

LFI Vulnerability in language parameter.
This exploit is dangerous. Because the LFI is done with require()
on a value saved in SQL, if the path is non-existent, the user
account will be broken. Additionally, this value must be <= 32chars
(MySQL vachar(32))

Vulnerability Type: Local File Include

For the exploit source code contact DSquare Security sales team.