CVE-2011-3832
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
29/01/2012
Last modified:
11/04/2025
Description
Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administrators to execute arbitrary PHP code via the application_name parameter in a save action.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/45453
- http://secunia.com/secunia_research/2011-78/
- http://www.osvdb.org/77002
- http://www.securityfocus.com/bid/50632
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71236
- http://secunia.com/advisories/45453
- http://secunia.com/secunia_research/2011-78/
- http://www.osvdb.org/77002
- http://www.securityfocus.com/bid/50632
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71236



