Vulnerability Details : CVE-2017-17674
BMC Remedy Mid Tier 9.1SP3 is affected by remote and local file inclusion. Due to the lack of restrictions on what can be targeted, the system can be vulnerable to attacks such as system fingerprinting, internal port scanning, Server Side Request Forgery (SSRF), or remote code execution (RCE).
Vulnerability category: File inclusionServer-side request forgery (SSRF) Execute code
Products affected by CVE-2017-17674
- cpe:2.3:a:bmc:remedy_mid-tier:9.1:sp3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-17674
0.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-17674
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-17674
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-17674
-
http://remedy.com
BMC Remedy ITSM | Remedy IT Service Management - BMC SoftwareProduct
-
http://bmc.com
BMC Software – Run and ReinventProduct
-
https://seclists.org/fulldisclosure/2017/Oct/52
Full Disclosure: Multiple vulnerabilities in BMC RemedyMailing List;Third Party Advisory
-
https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html
9.1.00: Fixes available for Remedy AR System security vulnerabilities - Documentation for Remedy Action Request System 9.1 - BMC DocumentationRelease Notes;Vendor Advisory
Jump to