Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to inject arbitrary web script or HTML via the (1) mode parameter to contact_support.php; (2) contractid parameter to contract_add_service.php; (3) user parameter to edit_backup_users.php; (4) id parameter to edit_escalation_path.php; the Referer to (5) forgotpwd.php, (6) an approvalpage action to billable_incidents.php, or (7) transactions.php; (8) action parameter to inbox.php; (9) search_string parameter in a findcontact action to incident_add.php; table1 parameter to (10) report_customers.php, (11) report_incidents_by_engineer.php, (12) report_incidents_by_site.php, or (13) report_marketing.php; or the (14) startdate or (15) enddate parameter to report_incidents_by_vendor.php.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2012-01-29T11:00:00Z

Updated: 2024-09-17T04:03:57.780Z

Reserved: 2012-01-28T00:00:00Z

Link: CVE-2011-5073

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2012-01-29T11:55:02.267

Modified: 2012-02-02T05:00:00.000

Link: CVE-2011-5073

cve-icon Redhat

No data.