7.5
CVSSv2

CVE-2014-4872

Published: 10/10/2014 Updated: 02/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote malicious users to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bmc track-it\\! 11.3.0.355

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::EXE def initialize(info = {}) super(update_info( ...
>> Multiple critical vulnerabilities in BMC Track-It! >> Discovered by Pedro Ribeiro (pedrib@gmailcom), Agile Information Security ================================================================================= The application exposes several NET remoting services on port 9010 NET remoting is a RMI technology similar to Java RMI ...
BMC Track-It! version 114 suffers from remote code execution and credential disclosure vulnerabilities ...
BMC Track-it! suffers from code execution, arbitrary file download, and remote SQL injection vulnerabilities ...

Github Repositories

This is a tool the decrypts Track-It passwords that are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm

___ ____ ____ ____ _ _ _ ___ / ___ ____ ____ ____ _ _ ___ ___ | |__/ |__| | |_/ __ | | / | \ |___ | |__/ \_/ |__] | | | \ | | |___ | \_ | | |__/ |___ |___ | \ | | | Track-It! Password Decrypter track-it_d