You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/exploits/multi/http/mantisbt_php_exec.rb
+42-29Lines changed: 42 additions & 29 deletions
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
18
18
The vulnerable code exists on plugins/XmlImportExport/ImportXml.php, which receives user input through the "description" field and the "issuelink" attribute of an uploaded XML file and passes to preg_replace() function with the /e modifier.
19
19
This allows a remote authenticated attacker to execute arbitrary PHP code on the remote machine.
20
20
This version also suffers from another issue. The import page is not checking the correct user level
21
-
of the user, so it's possible to exploit this issue with any user.
21
+
of the user, so it's possible to exploit this issue with any user including the anonymous one if enabled.
0 commit comments