An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.
History

Wed, 30 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-07-13T00:00:00

Updated: 2024-10-30T19:36:25.959Z

Reserved: 2023-06-18T00:00:00

Link: CVE-2023-35833

cve-icon Vulnrichment

Updated: 2024-08-02T16:30:45.384Z

cve-icon NVD

Status : Modified

Published: 2023-07-13T17:15:09.270

Modified: 2024-11-21T08:08:46.997

Link: CVE-2023-35833

cve-icon Redhat

No data.