6.8
CVSSv2

CVE-2011-5074

Published: 29/01/2012 Updated: 02/02/2012
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) prior to 3.65 allow remote malicious users to hijack the authentication of administrators for requests that change administrator email, add a new administrator, or insert arbitrary script via (1) user_profile_edit.php or (2) user_add.php.

Vulnerable Product Search on Vulmon Subscribe to Product

sitracker support incident tracker 3.35

sitracker support incident tracker 3.33

sitracker support incident tracker 3.32

sitracker support incident tracker 3.31

sitracker support incident tracker 3.60

sitracker support incident tracker 3.6

sitracker support incident tracker 3.51

sitracker support incident tracker 3.50

sitracker support incident tracker 3.22pl1

sitracker support incident tracker 3.22

sitracker support incident tracker 3.21

sitracker support incident tracker 3.63

sitracker support incident tracker

sitracker support incident tracker 3.62

sitracker support incident tracker 3.41

sitracker support incident tracker 3.36

sitracker support incident tracker 3.30

sitracker support incident tracker 3.24

sitracker support incident tracker 3.23

sitracker support incident tracker 3.45

sitracker support incident tracker 3.61

sitracker support incident tracker 3.40

Exploits

Advisory Details: High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in SiT! Support Incident Tracker, which can be exploited to perform SQL injection, cross-site scripting, cross-site request forgery attacks 1) Input passed via the "start" GET parameter to /portal/kbphp is not properly sanitised before being used ...