← Advisories

MantisBT <=1.2.3 (db_type) Local File Inclusion Vulnerability

High
Advisory ID
ZSL-2010-4984
Release Date
15 December 2010
Vendor
MantisBT Group - http://www.mantisbt.org
Affected Version
<1.2.4
Tested On
Microsoft Windows XP Professional SP3 (English), Debian GNU/Linux (squeeze), Apache 2.2.14 (Win32), MySQL 5.1.41, PHP 5.3.1
Summary

MantisBT is a free popular web-based bugtracking system. It is written in the PHP scripting language and works with MySQL, MS SQL, and PostgreSQL databases and a webserver. MantisBT has been installed on Windows, Linux, Mac OS, OS/2, and others. Almost any web browser should be able to function as a client. It is released under the terms of the GNU General Public License (GPL).

Description

Mantis Bug Tracker suffers from a local file inlcusion/disclosure (LFI/FD) vulnerability when input passed thru the "db_type" parameter (GET & POST) to upgrade_unattended.php script is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks and URL encoded NULL bytes.

--> library/adodb/adodb.inc.php ... 4109: 4110: $file = ADODB_DIR."/drivers/adodb-".$db.".inc.php"; 4111: @include_once($file); ...
Proof of Concept
Disclosure Timeline
13.12.2010Vulnerability discovered.
13.12.2010Initial contact with the vendor.
13.12.2010Vendor responds asking more details.
13.12.2010Sent PoC files to the vendor.
14.12.2010Vendor confirms the issue.
15.12.2010Vendor releases version 1.2.4 to address this issue (+Comment: Delete the "admin" directory after installation).
15.12.2010Coordinated public advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
15.12.2010Initial release
16.12.2010Added reference [13] and [14]
17.12.2010Added reference [15]
30.12.2010Added reference [16] and [17]
05.01.2011Added reference [18] and [19]
06.01.2011Added reference [20]
06.03.2011Added reference [21]