Description
Multiple SQL injection vulnerabilities in Support Incident Tracker (aka SiT!) before 3.64 allow remote attackers to execute arbitrary SQL commands via the (1) exc[] parameter to report_marketing.php, (2) selected[] parameter to tasks.php, (3) sites[] parameter to billable_incidents.php, or (4) search_string parameter to search.php. NOTE: some of these details are obtained from third party information.
Exploits (4)
exploitdb
WRITEUP
VERIFIED
by Yuri Goltsev · textwebappsphp
https://www.exploit-db.com/exploits/35988
exploitdb
WORKING POC
VERIFIED
by Yuri Goltsev · textwebappsphp
https://www.exploit-db.com/exploits/35987
exploitdb
WORKING POC
VERIFIED
by Yuri Goltsev · textwebappsphp
https://www.exploit-db.com/exploits/35985
exploitdb
WORKING POC
VERIFIED
by Yuri Goltsev · textwebappsphp
https://www.exploit-db.com/exploits/35986
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/45437
Mailing List mailing-list
x_refsource_bugtraq
http://seclists.org/bugtraq/2011/Jul/174
Various Sources x_refsource_misc
http://en.securitylab.ru/lab/PT-2011-25
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/45277
Third Party Advisory x_refsource_confirm
http://sitracker.org/wiki/ReleaseNotes364
Scores
EPSS
0.0043
EPSS Percentile
62.3%
Details
CWE
CWE-89
Status
published
Products (22)
sitracker/support_incident_tracker
3.6
sitracker/support_incident_tracker
3.21
sitracker/support_incident_tracker
3.22
sitracker/support_incident_tracker
3.22pl1
sitracker/support_incident_tracker
3.23
sitracker/support_incident_tracker
3.24 (2 CPE variants)
sitracker/support_incident_tracker
3.30 (2 CPE variants)
sitracker/support_incident_tracker
3.31
sitracker/support_incident_tracker
3.32
sitracker/support_incident_tracker
3.33
... and 12 more
Published
Jan 29, 2012
Tracked Since
Feb 18, 2026