Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-66xx-c9r9-f474

Опубликовано: 03 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

EPSS

Процентиль: 73%
0.00746
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-303

Связанные уязвимости

nvd
больше 1 года назад

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

CVSS3: 9.8
fstec
больше 1 года назад

Уязвимость реализации прикладного программного интерфейса средства управления политиками и стандартами безопасности IT-инфраструктуры Tripwire Enterprise (TE), позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и получить доступ на чтение и изменение данных

EPSS

Процентиль: 73%
0.00746
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-303