First published: Wed Aug 03 2022(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It! 20.21.02.109. Authentication is required to exploit this vulnerability. The specific flaw exists within the GetPopupSubQueryDetails endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-16690.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bmc Track-it\! | =20.19.03 | |
Bmc Track-it\! | =20.20.01 | |
Bmc Track-it\! | =20.20.02 | |
Bmc Track-it\! | =20.20.03 | |
Bmc Track-it\! | =20.21.01 | |
Bmc Track-it\! | =20.21.02 | |
BMC Track-It! |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35864 refers to a SQL Injection Information Disclosure Vulnerability in BMC Track-It! 20.21.02.109.
CVE-2022-35864 has a severity score of 6.5, which is classified as medium.
To exploit CVE-2022-35864, remote attackers would need to authenticate and send a crafted SQL query to the GetPopupSubQueryDetails endpoint in BMC Track-It! 20.21.02.109.
CVE-2022-35864 affects BMC Track-It! versions 20.19.03, 20.20.01, 20.20.02, 20.20.03, 20.21.01, and 20.21.02.
To fix CVE-2022-35864, it is recommended to apply the patches provided by BMC to the affected versions of BMC Track-It!.