Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to inject arbitrary web script or HTML via (1) the file name to incident_attachments.php; (2) unspecified vectors in link_add.php, possibly involving origref, linkref, linktype parameters, which are not properly handled in the clean_int function in lib/base.inc.php, or the redirect parameter, which is not properly handled in the html_redirect function in lib/html.inc.php; and (3) unspecified vectors in translate.php.
References
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/45437 - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/576355 - US Government Resource | |
References | () http://www.osvdb.org/77654 - | |
References | () http://www.osvdb.org/77655 - | |
References | () http://www.osvdb.org/77656 - | |
References | () http://www.securityfocus.com/bid/50896 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/71652 - |
Information
Published : 2012-01-29 04:04
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5070
Mitre link : CVE-2011-5070
CVE.ORG link : CVE-2011-5070
JSON object : View
Products Affected
sitracker
- support_incident_tracker
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')