Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php.
https://github.com/mantisbt/mantisbt/commit/6ede60d3db9e202044f135001589cce941ff6f0f
https://github.com/mantisbt/mantisbt/commit/5b93161f3ece2f73410c296fed8522f6475d273d
https://exchange.xforce.ibmcloud.com/vulnerabilities/69588
http://www.securityfocus.com/bid/49448
http://www.securityfocus.com/archive/1/519547/100/0/threaded
http://www.openwall.com/lists/oss-security/2011/09/04/2
http://www.debian.org/security/2011/dsa-2308
http://securityreason.com/securityalert/8392
http://security.gentoo.org/glsa/glsa-201211-01.xml