Impact
The vulnerability is a blind server‑side request forgery in the FootPrints ITSM searchWeb API. Authenticated attackers can supply arbitrary URLs that the server will resolve and request, using the FootPrints instance’s outbound network connectivity. This allows internal network scanning or interaction with internal services and can impact system availability. The weakness is classified as CWE‑918.
Affected Systems
Affected vendors and products are BMC Software, Inc. FootPrints ITSM. Versions from 20.20.02 up to and including 20.24.01.001 contain the flaw. BMC has released hot‑fixes for this issue; the following patched releases remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
Risk and Exploitability
The CVSS v3 score is 5.3, indicating moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user to submit a request to the searchWeb API, after which the server will perform an outbound request. The likelihood of exploitation is therefore limited to users with legitimate credentials who can reach the vulnerable API endpoint.
OpenCVE Enrichment