Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2024-33891
HistoryApr 28, 2024 - 12:00 a.m.

CVE-2024-33891

2024-04-2800:00:00
mitre
github.com
1
delinea secret server
bypassing authentication
soap api
hardcoded key
admin user
oauthexpirationid

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via the SOAP API in SecretServer/webservices/SSWebService.asmx. This is related to a hardcoded key, the use of the integer 2 for the Admin user, and removal of the oauthExpirationId attribute.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:delinea:secret_server:10.9.000002:*:*:*:*:*:*:*"
    ],
    "vendor": "delinea",
    "product": "secret_server",
    "versions": [
      {
        "status": "affected",
        "version": "11.7000001"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-33891