CVE-2011-5073

Sitracker Support Incident Tracker < 3.64 - XSS

Title source: rule

Description

Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to inject arbitrary web script or HTML via the (1) mode parameter to contact_support.php; (2) contractid parameter to contract_add_service.php; (3) user parameter to edit_backup_users.php; (4) id parameter to edit_escalation_path.php; the Referer to (5) forgotpwd.php, (6) an approvalpage action to billable_incidents.php, or (7) transactions.php; (8) action parameter to inbox.php; (9) search_string parameter in a findcontact action to incident_add.php; table1 parameter to (10) report_customers.php, (11) report_incidents_by_engineer.php, (12) report_incidents_by_site.php, or (13) report_marketing.php; or the (14) startdate or (15) enddate parameter to report_incidents_by_vendor.php.

Exploits (1)

exploitdb WORKING POC
webappsphp
https://www.exploit-db.com/exploits/18444

Scores

EPSS 0.0046
EPSS Percentile 63.7%

Classification

CWE
CWE-79
Status published

Affected Products (30)

sitracker/support_incident_tracker < 3.64
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
sitracker/support_incident_tracker
... and 15 more

Timeline

Published Jan 29, 2012
Tracked Since Feb 18, 2026