Eval Injection Vulnerability in Support Incident Tracker (SiT!) 3.65: Remote Code Execution via application_name Parameter

Eval Injection Vulnerability in Support Incident Tracker (SiT!) 3.65: Remote Code Execution via application_name Parameter

CVE-2011-3832 · MEDIUM Severity

AV:N/AC:L/AU:S/C:P/I:P/A:P

Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administrators to execute arbitrary PHP code via the application_name parameter in a save action.

Learn more about our Web Application Penetration Testing UK.