First published: Thu Nov 10 2022(Updated: )
An issue was discovered in BMC Remedy before 22.1. Email-based Incident Forwarding allows remote authenticated users to inject HTML (such as an SSRF payload) into the Activity Log by placing it in the To: field. This affects rendering that occurs upon a click in the "number of recipients" field. NOTE: the vendor's position is that "no real impact is demonstrated."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bmc Remedy It Service Management Suite | =20.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-26088.
The affected software is BMC Remedy IT Service Management Suite version 20.02.
The severity of CVE-2022-26088 is medium with a CVSS score of 5.4.
CVE-2022-26088 exploit occurs through email-based Incident Forwarding by injecting HTML (such as an SSRF payload) into the Activity Log through the To: field.
Yes, here are some references for CVE-2022-26088: [Packet Storm](http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html), [Full Disclosure](http://seclists.org/fulldisclosure/2022/Nov/10), [SEC Consult](https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/).