BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote attackers to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html | Third Party Advisory VDB Entry |
http://www.kb.cert.org/vuls/id/121036 | Third Party Advisory US Government Resource |
https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt | Broken Link Third Party Advisory |
Configurations
History
No history.
Information
Published : 2014-10-10 10:55
Updated : 2023-08-02 19:00
NVD link : CVE-2014-4872
Mitre link : CVE-2014-4872
CVE.ORG link : CVE-2014-4872
JSON object : View
Products Affected
bmc
- track-it\!
CWE
CWE-306
Missing Authentication for Critical Function