The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/136462/BMC-Server-Automation-BSA-RSCD-Agent-Unauthorized-Password-Reset.html - | |
References | () http://www.securityfocus.com/archive/1/537910/100/0/threaded - | |
References | () https://selfservice.bmc.com/casemgmt/sc_KnowledgeArticle?sfdcid=kA214000000dBpnCAE&type=Solution - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/43902/ - | |
References | () https://www.exploit-db.com/exploits/43939/ - | |
References | () https://www.insinuator.net/2016/03/bmc-bladelogic-cve-2016-1542-and-cve-2016-1543/ - |
Information
Published : 2016-06-13 14:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1543
Mitre link : CVE-2016-1543
CVE.ORG link : CVE-2016-1543
JSON object : View
Products Affected
bmc
- bladelogic_server_automation_console
CWE
CWE-284
Improper Access Control