An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.fortra.com/security/advisory/fi-2024-006 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: Fortra
Published: 2024-06-03T17:38:54.516Z
Updated: 2024-08-01T20:40:47.145Z
Reserved: 2024-04-29T22:31:16.171Z
Link: CVE-2024-4332
Vulnrichment
Updated: 2024-08-01T20:40:47.145Z
NVD
Status : Awaiting Analysis
Published: 2024-06-03T18:15:09.060
Modified: 2024-06-03T19:23:17.807
Link: CVE-2024-4332
Redhat
No data.