CVE-2011-4337

Static code injection vulnerability in translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to inject arbitrary PHP code into an executable language file in the i18n directory via the lang variable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sitracker:support_incident_tracker:3.6:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.45:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.45:beta1:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.50:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.50:beta1:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.51:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.60:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.61:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.62:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.63:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.63:beta1:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.64:*:*:*:*:*:*:*
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://bugs.sitracker.org/view.php?id=1737 - Exploit () http://bugs.sitracker.org/view.php?id=1737 - Exploit
References () http://www.exploit-db.com/exploits/18132/ - Exploit () http://www.exploit-db.com/exploits/18132/ - Exploit
References () http://www.openwall.com/lists/oss-security/2011/11/22/3 - Exploit () http://www.openwall.com/lists/oss-security/2011/11/22/3 - Exploit
References () http://www.securityfocus.com/archive/1/520577 - Exploit () http://www.securityfocus.com/archive/1/520577 - Exploit

Information

Published : 2012-01-29 11:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4337

Mitre link : CVE-2011-4337

CVE.ORG link : CVE-2011-4337


JSON object : View

Products Affected

sitracker

  • support_incident_tracker
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')