Vulnerabilities > CVE-2016-6599 - Credentials Management vulnerability in BMC Track-It! 11.4

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
bmc
CWE-255
exploit available

Summary

BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.

Vulnerable Configurations

Part Description Count
Application
Bmc
3

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionBMC Track-It! 11.4 - Multiple Vulnerabilities. CVE-2016-6598,CVE-2016-6599. Webapps exploit for Windows platform
idEDB-ID:43883
last seen2018-01-25
modified2015-09-28
published2015-09-28
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/43883/
titleBMC Track-It! 11.4 - Multiple Vulnerabilities

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/146110/bmctrackit114-exec.txt
idPACKETSTORM:146110
last seen2018-01-29
published2018-01-26
reporterPedro Ribeiro
sourcehttps://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html
titleBMC Track-It! 11.4 Code Execution / Information Disclosure