Lucene search

K
cvelistZdiCVELIST:CVE-2022-35865
HistoryAug 03, 2022 - 3:21 p.m.

CVE-2022-35865

2022-08-0315:21:53
CWE-306
zdi
www.cve.org

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.036 Low

EPSS

Percentile

91.7%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It! 20.21.2.109. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16709.

CNA Affected

[
  {
    "product": "Track-It!",
    "vendor": "BMC",
    "versions": [
      {
        "status": "affected",
        "version": "20.21.2.109"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.036 Low

EPSS

Percentile

91.7%

Related for CVELIST:CVE-2022-35865