Описание
Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via the SOAP API in SecretServer/webservices/SSWebService.asmx. This is related to a hardcoded key, the use of the integer 2 for the Admin user, and removal of the oauthExpirationId attribute.
Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via the SOAP API in SecretServer/webservices/SSWebService.asmx. This is related to a hardcoded key, the use of the integer 2 for the Admin user, and removal of the oauthExpirationId attribute.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-33891
- https://delinea.com/products/secret-server
- https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000001.htm
- https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2024-33891.py
- https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3
- https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3
Связанные уязвимости
Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via the SOAP API in SecretServer/webservices/SSWebService.asmx. This is related to a hardcoded key, the use of the integer 2 for the Admin user, and removal of the oauthExpirationId attribute.
Уязвимость реализации прикладного программного интерфейса программного средства управления привилегированными учетными записями Delinea Secret Server, позволяющая нарушителю обойти процедуру аутентификации