Sitracker Support Incident Tracker up to 3.62 user_profile_edit.php cross-site request forgery
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Sitracker Support Incident Tracker up to 3.62. It has been classified as problematic. This affects an unknown part of the file user_profile_edit.php. Performing a manipulation results in cross-site request forgery. This vulnerability is identified as CVE-2011-5074. The attack can be initiated remotely. Additionally, an exploit exists. Upgrading the affected component is recommended.
Details
A vulnerability, which was classified as problematic, was found in Sitracker Support Incident Tracker up to 3.62 (Ticket Tracking Software). This affects an unknown code block of the file user_profile_edit.php. The manipulation with an unknown input leads to a cross-site request forgery vulnerability. CWE is classifying the issue as CWE-352. The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to hijack the authentication of administrators for requests that change administrator email, add a new administrator, or insert arbitrary script via (1) user_profile_edit.php or (2) user_add.php.
The weakness was released 01/29/2012 (Website). It is possible to read the advisory at htbridge.ch. This vulnerability is uniquely identified as CVE-2011-5074 since 01/28/2012. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. It demands that the victim is doing some kind of user interaction. Technical details and a public exploit are known.
The exploit is shared for download at exploit-db.com. It is declared as proof-of-concept. By approaching the search of inurl:user_profile_edit.php it is possible to find vulnerable targets with Google Hacking.
Upgrading to version 3.63 eliminates this vulnerability.
The vulnerability is also documented in the databases at Exploit-DB (18444) and Secunia (SA46019†). Entries connected to this vulnerability are available at VDB-60050 and VDB-60049. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
- 3.0
- 3.1
- 3.2
- 3.3
- 3.4
- 3.5
- 3.6
- 3.7
- 3.8
- 3.9
- 3.10
- 3.11
- 3.12
- 3.13
- 3.14
- 3.15
- 3.16
- 3.17
- 3.18
- 3.19
- 3.20
- 3.21
- 3.22
- 3.23
- 3.24
- 3.25
- 3.26
- 3.27
- 3.28
- 3.29
- 3.30
- 3.31
- 3.32
- 3.33
- 3.34
- 3.35
- 3.36
- 3.37
- 3.38
- 3.39
- 3.40
- 3.41
- 3.42
- 3.43
- 3.44
- 3.45
- 3.46
- 3.47
- 3.48
- 3.49
- 3.50
- 3.51
- 3.52
- 3.53
- 3.54
- 3.55
- 3.56
- 3.57
- 3.58
- 3.59
- 3.60
- 3.61
- 3.62
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 5.7
VulDB Base Score: 6.3
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross-site request forgeryCWE: CWE-352 / CWE-862 / CWE-863
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 802388
OpenVAS Name: Support Incident Tracker SiT! Multiple SQL Injection And XSS Vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Support Incident Tracker 3.63
Timeline
01/28/2012 🔍01/29/2012 🔍
01/29/2012 🔍
03/23/2015 🔍
01/17/2025 🔍
Sources
Advisory: htbridge.chStatus: Confirmed
Confirmation: 🔍
CVE: CVE-2011-5074 (🔍)
GCVE (CVE): GCVE-0-2011-5074
GCVE (VulDB): GCVE-100-60051
Secunia: 46019
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 01/17/2025 14:10
Changes: 03/23/2015 16:50 (53), 01/30/2018 10:27 (3), 01/17/2025 14:10 (27)
Complete: 🔍
Cache ID: 216:24C:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.