Static code injection vulnerability in translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to inject arbitrary PHP code into an executable language file in the i18n directory via the lang variable.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.sitracker.org/view.php?id=1737 - Exploit | |
References | () http://www.exploit-db.com/exploits/18132/ - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2011/11/22/3 - Exploit | |
References | () http://www.securityfocus.com/archive/1/520577 - Exploit |
Information
Published : 2012-01-29 11:55
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4337
Mitre link : CVE-2011-4337
CVE.ORG link : CVE-2011-4337
JSON object : View
Products Affected
sitracker
- support_incident_tracker
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')