CVE-2017-17674
📋 TL;DR
CVE-2017-17674 is a remote/local file inclusion vulnerability in BMC Remedy Mid Tier that allows attackers to read arbitrary files and make unauthorized requests. This affects BMC Remedy Mid Tier 9.1SP3 installations, potentially exposing sensitive data and enabling further attacks.
💻 Affected Systems
- BMC Remedy Mid Tier
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.
Likely Case
Server-side request forgery (SSRF) allowing internal network reconnaissance, port scanning, and potential data leakage through file inclusion.
If Mitigated
Limited information disclosure if proper network segmentation and access controls prevent external exploitation.
🎯 Exploit Status
Exploitation requires minimal technical skill with publicly available proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches referenced in BMC security advisory
Vendor Advisory: https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html
Restart Required: Yes
Instructions:
1. Download the security patch from BMC support portal. 2. Apply the patch according to BMC documentation. 3. Restart the Remedy Mid Tier service. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to BMC Remedy Mid Tier to trusted networks only
Web Application Firewall Rules
allImplement WAF rules to block file inclusion patterns and SSRF attempts
🧯 If You Can't Patch
- Isolate the BMC Remedy Mid Tier server in a restricted network segment
- Implement strict firewall rules to limit inbound connections to only necessary sources
🔍 How to Verify
Check if Vulnerable:
Check if running BMC Remedy Mid Tier 9.1SP3 without the security patch applied
Check Version:
Check the version in the Remedy Mid Tier administration interface or configuration files
Verify Fix Applied:
Verify patch installation through BMC administration console and test that file inclusion attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual file path requests in web server logs
- Requests to internal IP addresses from the Mid Tier server
Network Indicators:
- Outbound connections from Mid Tier server to unexpected internal services
- Patterns of file inclusion attempts in HTTP traffic
SIEM Query:
source="web_server_logs" AND (url="*../../*" OR url="*file=*" OR url="*include=*")
🔗 References
- http://bmc.com
- http://remedy.com
- https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html
- https://seclists.org/fulldisclosure/2017/Oct/52
- http://bmc.com
- http://remedy.com
- https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html
- https://seclists.org/fulldisclosure/2017/Oct/52