Логотип exploitDog
bind:CVE-2024-4332
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4332

Количество 3

Количество 3

nvd логотип

CVE-2024-4332

больше 1 года назад

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

EPSS: Низкий
github логотип

GHSA-66xx-c9r9-f474

больше 1 года назад

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

EPSS: Низкий
fstec логотип

BDU:2024-04502

больше 1 года назад

Уязвимость реализации прикладного программного интерфейса средства управления политиками и стандартами безопасности IT-инфраструктуры Tripwire Enterprise (TE), позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и получить доступ на чтение и изменение данных

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4332

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

1%
Низкий
больше 1 года назад
github логотип
GHSA-66xx-c9r9-f474

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

1%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-04502

Уязвимость реализации прикладного программного интерфейса средства управления политиками и стандартами безопасности IT-инфраструктуры Tripwire Enterprise (TE), позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и получить доступ на чтение и изменение данных

CVSS3: 9.8
1%
Низкий
больше 1 года назад

Уязвимостей на страницу