This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It!. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
BMC Track-It! |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-22-968 is considered a high severity vulnerability due to its potential for remote code execution.
To fix ZDI-22-968, you should upgrade BMC Track-It! to the latest version that includes the security patch.
All installations of BMC Track-It! that have not applied the latest security updates are affected by ZDI-22-968.
ZDI-22-968 is a remote code execution vulnerability resulting from improper authorization of HTTP requests.
No, authentication is not required to exploit ZDI-22-968, making it particularly dangerous.