An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.fortra.com/security/advisory/fi-2024-006 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2024-08-01T20:40:47.145Z
Reserved: 2024-04-29T22:31:16.171Z
Link: CVE-2024-4332

Updated: 2024-08-01T20:40:47.145Z

Status : Awaiting Analysis
Published: 2024-06-03T18:15:09.060
Modified: 2024-11-21T09:42:38.703
Link: CVE-2024-4332

No data.