CVE-2011-4337
Published Jan 29, 2012
Last updated 13 years ago
Overview
- Description
- Static code injection vulnerability in translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to inject arbitrary PHP code into an executable language file in the i18n directory via the lang variable.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48854537-091C-4350-A42E-8E6AA19A4C55" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65028034-D504-49CF-A62B-827A7F86733E" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.45:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E4CD2D0-66BF-4E95-B3AE-7598902B2C72" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2163711F-8830-471A-A9AE-C4B90DB1BC4C" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.50:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF3D5C9C-05DE-44A1-AEC2-308E87D2E0CD" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7929BFDD-9FA8-422B-945D-6FEC46B89E69" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5567EF75-2161-4A74-AADE-109B3F0DFD26" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "228B6318-F28A-4CB7-A054-5CB1E1C75048" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.62:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68D7980E-CA09-4A29-9901-47FE92A892E0" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.63:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59E43ED2-A943-4D8C-AAD2-189647073814" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.63:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2C5C37A-8952-47E9-A081-A0EBDC7E7AF6" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.64:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C04580AF-8B83-4F0C-BD04-DCCA1BAB8F1F" }, { "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "691D701C-AEA0-400C-92E9-DAE772E1CBB1" } ], "operator": "OR" } ] } ]