CVE-2024-34398
📋 TL;DR
CVE-2024-34398 is a stored HTML injection vulnerability in BMC Remedy Mid Tier 7.6.04 that allows authenticated attackers to inject malicious HTML content into the web application. This affects organizations using this specific version of BMC's IT service management platform. The vulnerability enables attackers to modify web page content seen by other users.
💻 Affected Systems
- BMC Remedy Mid Tier
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject malicious scripts leading to session hijacking, credential theft, or redirection to phishing sites for other authenticated users.
Likely Case
Attackers modify web page content to display misleading information, deface pages, or conduct limited phishing attacks against other users.
If Mitigated
With proper input validation and output encoding, injected content would be rendered harmless as plain text.
🎯 Exploit Status
Exploitation requires authenticated access. HTML injection vulnerabilities are typically straightforward to exploit once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html
Restart Required: Yes
Instructions:
1. Check BMC's official security advisories for patch availability. 2. Apply the official patch when released. 3. Restart the Remedy Mid Tier service. 4. Verify the fix by testing HTML injection attempts.
🔧 Temporary Workarounds
Implement Input Validation
allAdd server-side validation to sanitize user input before processing
Custom implementation required - no standard commands
Enable Output Encoding
allConfigure the application to encode HTML special characters in user-supplied content
Custom configuration required - no standard commands
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block HTML injection patterns
- Restrict user permissions to minimize attack surface and limit who can inject content
🔍 How to Verify
Check if Vulnerable:
Test by attempting to inject HTML tags (like <b>test</b>) through authenticated user input fields and checking if they render as HTML
Check Version:
Check the Remedy Mid Tier version through the application interface or configuration files
Verify Fix Applied:
After applying controls, test HTML injection attempts to confirm they are properly sanitized and displayed as plain text
📡 Detection & Monitoring
Log Indicators:
- Unusual HTML tags or script elements in user input logs
- Multiple failed injection attempts
Network Indicators:
- HTTP requests containing suspicious HTML/script payloads to vulnerable endpoints
SIEM Query:
source="remedy_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")