Multiple SQL injection vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to execute arbitrary SQL commands via the (1) start parameter to portal/kb.php; (2) contractid parameter to contract_add_service.php; (3) id parameter to edit_escalation_path.php; (4) unlock, (5) lock, or (6) selected parameter to holding_queue.php; inc parameter in a report action to (7) report_customers.php or (8) report_incidents_by_site.php; (9) start parameter to search.php; or (10) sites parameter to transactions.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/46019 - Vendor Advisory | |
References | () http://sitracker.org/wiki/ReleaseNotes365 - | |
References | () http://www.securityfocus.com/archive/1/519636 - Exploit | |
References | () https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_sit_support_incident_tracker.html - Exploit |
Information
Published : 2012-01-29 11:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5072
Mitre link : CVE-2011-5072
CVE.ORG link : CVE-2011-5072
JSON object : View
Products Affected
sitracker
- support_incident_tracker
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')