Vulnerability Details : CVE-2011-5074
Potential exploit
Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to hijack the authentication of administrators for requests that change administrator email, add a new administrator, or insert arbitrary script via (1) user_profile_edit.php or (2) user_add.php.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2011-5074
- cpe:2.3:a:sitracker:support_incident_tracker:*:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.23:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta-2:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.22:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.21:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.22pl1:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.33:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.35:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.30:beta2:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.30:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.40:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.40:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.24:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.35:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.36:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.31:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.32:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.41:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.45:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.45:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.60:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.61:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.62:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.63:beta1:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.50:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.51:*:*:*:*:*:*:*
- cpe:2.3:a:sitracker:support_incident_tracker:3.63:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-5074
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-5074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-5074
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-5074
-
http://sitracker.org/wiki/ReleaseNotes365
ReleaseNotes365 - Sit
-
http://www.securityfocus.com/archive/1/519636
SecurityFocusExploit
-
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_sit_support_incident_tracker.html
Multiple Vulnerabilities in SiT! Support Incident Tracker - HTB23043 Security Advisory | ImmuniWebExploit
-
http://secunia.com/advisories/46019
Sign inVendor Advisory
Jump to