CVE-2014-8270
BMC Track-It! Web Account Credential Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset.
BMC Track-It! 11.3 permite a atacantes remotos ganar privilegios y ejecutar código arbitrario mediante la ceración de una cuenta cuya nombre coincide con él de una cuenta de sistema local, posteriormente realizando una recalibración de la contraseña.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BMC Track-It!. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of password resets. The issue lies in the ability to register an account matching the name of a local account on the system and then reset the password for it. An attacker can leverage this vulnerability to gain credentials for the Administrator account on the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-10-12 CVE Reserved
- 2014-12-09 CVE Published
- 2024-08-06 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-14-419 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-14-419 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bmc Search vendor "Bmc" | Track-it\! Search vendor "Bmc" for product "Track-it\!" | 11.3 Search vendor "Bmc" for product "Track-it\!" and version "11.3" | - |
Affected
|