BMC Track-It! 11.3.0.355 allows remote authenticated users to read arbitrary files by visiting the TrackItWeb/Attachment page.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html | Third Party Advisory VDB Entry |
http://www.kb.cert.org/vuls/id/121036 | Third Party Advisory US Government Resource |
https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt | Broken Link Third Party Advisory |
Configurations
History
02 Aug 2023, 16:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:bmc:track-it\!:11.3.0.355:*:*:*:*:*:*:* | |
References | (MISC) https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt - Broken Link, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html - Third Party Advisory, VDB Entry |
Information
Published : 2014-10-10 10:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-4874
Mitre link : CVE-2014-4874
CVE.ORG link : CVE-2014-4874
JSON object : View
Products Affected
bmc
- track-it\!
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor