SEC Consult Vulnerability Lab Security Advisory < 20221110-0 > ======================================================================= title: HTML Injection product: BMC Remedy ITSM-Suite vulnerable version: 9.1.10 (= 20.02 in new versioning scheme) fixed version: 22.1 CVE number: CVE-2022-26088 impact: Low homepage: https://www.bmc.com/it-solutions/remedy-itsm.html found: 2021-08-11 by: Daniel Hirschberger (Office Bochum) SEC Consult Vulnerability Lab An integrated part of SEC Consult, an Atos company Europe | Asia | North America https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "Remedy IT Service Management Suite (Remedy ITSM Suite) and BMC Helix ITSM service provide out of-the-box IT Information Library (ITIL) service support functionality. Remedy ITSM Suite and BMC Helix ITSM service streamline and automate the processes around IT service desk, asset management, and change management operations. It also enables you to link your business services to your IT infrastructure to help you manage the impact of technology changes on business and business changes on technology — in real time and into the future. In addition, you can understand and optimize the user experience, balance current and future infrastructure investments, and view potential impact on the business by using a real-time service model." Source: https://docs.bmc.com/docs/itsm91/home-608490971.html Business recommendation: ------------------------ The vendor provides an updated version which should be installed immediately. The vendor states that: > We have done hardening in version 22.1. > However, we do not agree with assigning the CVE to this vulnerability. > As mentioned previously this is an informative vulnerability, and no real impact is demonstrated. Nevertheless, this can be used to trigger actions on internal services via CSRF or exfiltrate information. Vulnerability overview/description: ----------------------------------- 1) HTML Injection (CVE-2022-26088) An authenticated attacker who can forward incidents per email is able to inject a limited set of HTML tags. This is accomplished by inserting arbitrary content into the "To:" field of the email. There is a filtering mechanism that prevents the injection of many HTML tags, for example