Lucene search

K
cve[email protected]CVE-2022-35865
HistoryAug 03, 2022 - 4:15 p.m.

CVE-2022-35865

2022-08-0316:15:08
CWE-306
web.nvd.nist.gov
39
8
cve-2022-35865
bmc track-it!
remote code execution
authentication bypass
authorization flaw
zdi-can-16709
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.036 Low

EPSS

Percentile

91.7%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It! 20.21.2.109. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16709.

Affected configurations

Vulners
NVD
Node
bmctrack-it\!Range20.21.2.109

CNA Affected

[
  {
    "product": "Track-It!",
    "vendor": "BMC",
    "versions": [
      {
        "status": "affected",
        "version": "20.21.2.109"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.036 Low

EPSS

Percentile

91.7%

Related for CVE-2022-35865