CVE-2016-6599
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
30/01/2018
Last modified:
26/02/2018
Description
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bmc:track-it\!:*:*:*:*:*:*:*:* | 11.4 (including) | |
| cpe:2.3:a:bmc:track-it\!:11.4:hf1:*:*:*:*:*:* | ||
| cpe:2.3:a:bmc:track-it\!:11.4:hf2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html
- http://seclists.org/fulldisclosure/2018/Jan/92
- https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2016/01/04/track-it-security-advisory-24-dec-2015
- https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt



