Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to inject arbitrary web script or HTML via (1) the file name to incident_attachments.php; (2) unspecified vectors in link_add.php, possibly involving origref, linkref, linktype parameters, which are not properly handled in the clean_int function in lib/base.inc.php, or the redirect parameter, which is not properly handled in the html_redirect function in lib/html.inc.php; and (3) unspecified vectors in translate.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/71652 | vdb entry |
http://www.kb.cert.org/vuls/id/576355 | third party advisory us government resource |
http://secunia.com/advisories/45437 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/50896 | vdb entry |
http://www.osvdb.org/77655 | vdb entry |
http://www.osvdb.org/77654 | vdb entry |
http://www.osvdb.org/77656 | vdb entry |