SQL injection vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote attackers to execute arbitrary SQL commands via an uploaded file with a crafted file name.
References
Link | Resource |
---|---|
http://secunia.com/advisories/45453 | Vendor Advisory |
http://secunia.com/secunia_research/2011-77/ | Vendor Advisory |
http://www.kb.cert.org/vuls/id/576355 | US Government Resource |
http://www.osvdb.org/77001 | |
http://www.securityfocus.com/bid/50632 | Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71235 |
Configurations
History
No history.
Information
Published : 2012-01-29 04:04
Updated : 2024-02-28 11:41
NVD link : CVE-2011-3831
Mitre link : CVE-2011-3831
CVE.ORG link : CVE-2011-3831
JSON object : View
Products Affected
sitracker
- support_incident_tracker
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')