vendor:
Support Incident Tracker
by:
Egidio Romano aka EgiX
9.3
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Support Incident Tracker
Affected Version From: 3.45
Affected Version To: 3.65
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Support Incident Tracker <= 3.65 (translate.php) Remote Code Execution Exploit
Input passed via keys of $_POST array isn't properly sanitized before being stored into $i18nfile variable at line 239, that variable will be the contents of a language file stored into 'i18n' directory with a php extension. This could allow authenticated users to inject and execute arbitrary PHP code. Furthermore, access directly to /translate.php?mode=save will reveal the full installation path of the application.
Mitigation:
Upgrade to the latest version of Support Incident Tracker (3.66) or apply the patch provided by the vendor.