CVE-2016-6598

BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting file storage service (FileStorageService) on port 9010. This service contains a method that allows uploading a file to an arbitrary path on the machine that is running Track-It!. This can be used to upload a file to the web root and achieve code execution as NETWORK SERVICE or SYSTEM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bmc:track-it\!:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:bmc:track-it\!:11.4:hf1:*:*:*:*:*:*
cpe:2.3:a:bmc:track-it\!:11.4:hf2:*:*:*:*:*:*

History

21 Nov 2024, 02:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2018/Jan/92 - Exploit, Mailing List, Technical Description, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Jan/92 - Exploit, Mailing List, Technical Description, Third Party Advisory
References () https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2016/01/04/track-it-security-advisory-24-dec-2015 - Vendor Advisory () https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2016/01/04/track-it-security-advisory-24-dec-2015 - Vendor Advisory
References () https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt - Exploit, Third Party Advisory () https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt - Exploit, Third Party Advisory

Information

Published : 2018-01-30 20:29

Updated : 2024-11-21 02:56


NVD link : CVE-2016-6598

Mitre link : CVE-2016-6598

CVE.ORG link : CVE-2016-6598


JSON object : View

Products Affected

bmc

  • track-it\!
CWE
CWE-284

Improper Access Control