Description
An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.
Published: 2023-07-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 30 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Ysoft Safeq Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-30T19:36:25.959Z

Reserved: 2023-06-18T00:00:00.000Z

Link: CVE-2023-35833

cve-icon Vulnrichment

Updated: 2024-08-02T16:30:45.384Z

cve-icon NVD

Status : Modified

Published: 2023-07-13T17:15:09.270

Modified: 2024-11-21T08:08:46.997

Link: CVE-2023-35833

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses