Vulnerability Details : CVE-2011-4337
Static code injection vulnerability in translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to inject arbitrary PHP code into an executable language file in the i18n directory via the lang variable.
Products affected by CVE-2011-4337
- cpe:2.3:a:sitracker:support_incident_tracker:3.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.45:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.45:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.60:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.61:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.62:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.64:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.63:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.50:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.51:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.63:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4337
0.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4337
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-4337
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4337
-
http://www.openwall.com/lists/oss-security/2011/11/22/3
oss-security - Re: Fwd: Support Incident Tracker <= 3.65 (translate.php) Remote Code Execution VulnerabilityExploit
-
http://www.securityfocus.com/archive/1/520577
SecurityFocusExploit
-
http://www.exploit-db.com/exploits/18132/
Support Incident Tracker 3.65 - 'translate.php' Remote Code Execution - PHP webapps ExploitExploit
-
http://bugs.sitracker.org/view.php?id=1737
0001737: PHP Code Injection Vulnerability - SiT! BugsExploit
Jump to