Количество 3
Количество 3
CVE-2024-4332
An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
GHSA-66xx-c9r9-f474
An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
BDU:2024-04502
Уязвимость реализации прикладного программного интерфейса средства управления политиками и стандартами безопасности IT-инфраструктуры Tripwire Enterprise (TE), позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и получить доступ на чтение и изменение данных
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-4332 An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification. | 1% Низкий | больше 1 года назад | ||
GHSA-66xx-c9r9-f474 An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification. | 1% Низкий | больше 1 года назад | ||
BDU:2024-04502 Уязвимость реализации прикладного программного интерфейса средства управления политиками и стандартами безопасности IT-инфраструктуры Tripwire Enterprise (TE), позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и получить доступ на чтение и изменение данных | CVSS3: 9.8 | 1% Низкий | больше 1 года назад |
Уязвимостей на страницу