Vulnerability CVE-2011-3833


Published: 2012-01-28   Modified: 2012-02-13

Description:
Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary PHP code by uploading a PHP file, then accessing it via a direct request to the file in an unspecified directory.

See advisories in our WLB2 database:
Topic
Author
Date
High
Support Incident Tracker 3.65 Remote Code Execution
Egidio Romano ak...
21.11.2011
High
Support Incident Tracker 3.65 Remote Code Execution
juan vazquez
30.01.2012

Type:

CWE-Other

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Sitracker -> Support incident tracker 

 References:
http://www.kb.cert.org/vuls/id/576355
http://xforce.iss.net/xforce/xfdb/71651
http://xforce.iss.net/xforce/xfdb/71237
http://www.securityfocus.com/bid/50896
http://www.securityfocus.com/bid/50632
http://www.osvdb.org/77003
http://www.exploit-db.com/exploits/18108
http://secunia.com/secunia_research/2011-79/
http://secunia.com/advisories/45453
http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt

Copyright 2024, cxsecurity.com

 

Back to Top