This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability. The specific flaw exists within the GetData endpoint. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
BMC Track-It! |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-001 is considered medium due to the requirement for authentication to exploit the vulnerability.
To fix ZDI-22-001, ensure that you apply the latest security patches provided by BMC for Track-It!.
Exploiting ZDI-22-001 can lead to the disclosure of sensitive information that may be accessible through the affected endpoint.
Yes, authentication is required to exploit the ZDI-22-001 vulnerability.
ZDI-22-001 affects BMC Track-It! installations.