Eval Injection Vulnerability in Support Incident Tracker (SiT!) 3.65: Remote Code Execution via application_name Parameter
CVE-2011-3832 · MEDIUM Severity
AV:N/AC:L/AU:S/C:P/I:P/A:P
Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administrators to execute arbitrary PHP code via the application_name parameter in a save action.
Learn more about our Web Application Penetration Testing UK.