본문 바로가기

취약점 정보1

BMC Track-It! contains multiple vulnerabilities

728x90

BMC Track-It! version 11.3.0.355 contains multiple vulnerabilities

Description

CWE-306: Missing Authentication for Critical Function - CVE-2014-4872

BMC Track-It! exposes several dangerous remote .NET services on port 9010 without authentication. .NET remoting allows a user to invoke methods remotely and retrieve their result. The exposed service FileStorageService allows for arbitrary file upload and code execution. The exposed service ConfigurationService allows for retrieval of configuration files which contain both application and domain credentials.

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - CVE-2014-4873
An authenticated user can engage in blind SQL Injection by entering comparison operators in the POST string for the/TrackItWeb/Grid/GetData page.

CWE-264: Permissions, Privileges, and Access Controls - CVE-2014-4874
A remote authenticated user can download arbitrary files on the /TrackItWeb/Attachment page.

The CVSS score reflects CVE-2014-4872.

Impact

A remote unauthenticated attacker may be able to upload and download arbitrary files and execute arbitrary code.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Use a Firewall
Using a firewall to block inbound requests to port 9010 will prevent access to the vulnerable methods, although it may interfere with normal program operation.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
BMC SoftwareUnknown21 Aug 201401 Oct 2014

If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base10.0AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal8.1E:F/RL:W/RC:UC
Environmental6.1CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Pedro Ribeiro (pedrib@gmail.com) from Agile Information Security for reporting this vulnerability.

This document was written by Chris King.

Other Information

728x90