製品・ソフトウェアに関する情報
Support Incident Tracker に複数の脆弱性
Title Support Incident Tracker に複数の脆弱性
Summary

Support Incident Tracker (SiT!) には、複数の脆弱性が存在します。 SiT! には、悪意あるファイルのアップロード、SQL インジェクション、クロスサイトスクリプティング、クロスサイトリクエストフォージェリの脆弱性が存在します。

Possible impacts 第三者により、ウェブサーバへ悪意あるファイルをアップロードされたり、ログインしているユーザの権限で SQL コマンドが実行されたり、ユーザのウェブブラウザ上で任意のスクリプトが実行されるなどの可能性があります。
Solution

2011年12月5日現在、対策方法はありません。

Publication Date Dec. 5, 2011, midnight
Registration Date Dec. 27, 2011, 9:42 a.m.
Last Update Dec. 27, 2011, 9:42 a.m.
Affected System
The Support Incident Tracker Project
SiT! バージョン 3.65 およびそれ以前
CVE (情報セキュリティ 共通脆弱性識別子)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2011年12月27日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2011-3831
Summary

SQL injection vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote attackers to execute arbitrary SQL commands via an uploaded file with a crafted file name.

Publication Date Jan. 29, 2012, 1:04 p.m.
Registration Date Jan. 28, 2021, 4:39 p.m.
Last Update Nov. 21, 2024, 10:31 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2011-3833
Summary

Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary PHP code by uploading a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Publication Date Jan. 29, 2012, 1:04 p.m.
Registration Date Jan. 28, 2021, 4:39 p.m.
Last Update Nov. 21, 2024, 10:31 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2011-5067
Summary

move_uploaded_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to obtain sensitive information via the file name, which reveals the installation path in an error message.

Publication Date Jan. 29, 2012, 1:04 p.m.
Registration Date Jan. 28, 2021, 4:40 p.m.
Last Update Nov. 21, 2024, 10:33 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2011-5068
Summary

Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to hijack the authentication of user for requests that delete a user via user_delete.php and other unspecified programs.

Publication Date Jan. 29, 2012, 1:04 p.m.
Registration Date Jan. 28, 2021, 4:40 p.m.
Last Update Nov. 21, 2024, 10:33 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2011-5069
Summary

Unrestricted file upload vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in unspecified directory, a different program than CVE-2011-3833.

Publication Date Jan. 29, 2012, 1:04 p.m.
Registration Date Jan. 28, 2021, 4:40 p.m.
Last Update Nov. 21, 2024, 10:33 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2011-5070
Summary

Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to inject arbitrary web script or HTML via (1) the file name to incident_attachments.php; (2) unspecified vectors in link_add.php, possibly involving origref, linkref, linktype parameters, which are not properly handled in the clean_int function in lib/base.inc.php, or the redirect parameter, which is not properly handled in the html_redirect function in lib/html.inc.php; and (3) unspecified vectors in translate.php.

Publication Date Jan. 29, 2012, 1:04 p.m.
Registration Date Jan. 28, 2021, 4:40 p.m.
Last Update Nov. 21, 2024, 10:33 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sitracker:support_incident_tracker:3.65:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List