Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administrators to execute arbitrary PHP code via the application_name parameter in a save action.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Support Incident Tracker ‘config.php’ 任意代码执行漏洞
Vulnerability Description
Support Incident Tracker (or SiT!)是一个基于Web技术支持电话或电子邮件的追踪应用程序。 Support Incident Tracker中存在漏洞。由于config.php中的"application_name"参数传递的输入在被用于"eval()"调用之前不能正确过滤,攻击者可利用该漏洞执行任意PHP代码。
CVSS Information
N/A
Vulnerability Type
N/A