CVE-2024-34398

4.2 MEDIUM

📋 TL;DR

CVE-2024-34398 is a stored HTML injection vulnerability in BMC Remedy Mid Tier 7.6.04 that allows authenticated attackers to inject malicious HTML content into the web application. This affects organizations using this specific version of BMC's IT service management platform. The vulnerability enables attackers to modify web page content seen by other users.

💻 Affected Systems

Products:
  • BMC Remedy Mid Tier
Versions: 7.6.04
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. The vulnerability exists in the web application layer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts leading to session hijacking, credential theft, or redirection to phishing sites for other authenticated users.

🟠

Likely Case

Attackers modify web page content to display misleading information, deface pages, or conduct limited phishing attacks against other users.

🟢

If Mitigated

With proper input validation and output encoding, injected content would be rendered harmless as plain text.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. HTML injection vulnerabilities are typically straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html

Restart Required: Yes

Instructions:

1. Check BMC's official security advisories for patch availability. 2. Apply the official patch when released. 3. Restart the Remedy Mid Tier service. 4. Verify the fix by testing HTML injection attempts.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side validation to sanitize user input before processing

Custom implementation required - no standard commands

Enable Output Encoding

all

Configure the application to encode HTML special characters in user-supplied content

Custom configuration required - no standard commands

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block HTML injection patterns
  • Restrict user permissions to minimize attack surface and limit who can inject content

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject HTML tags (like <b>test</b>) through authenticated user input fields and checking if they render as HTML

Check Version:

Check the Remedy Mid Tier version through the application interface or configuration files

Verify Fix Applied:

After applying controls, test HTML injection attempts to confirm they are properly sanitized and displayed as plain text

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML tags or script elements in user input logs
  • Multiple failed injection attempts

Network Indicators:

  • HTTP requests containing suspicious HTML/script payloads to vulnerable endpoints

SIEM Query:

source="remedy_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export