Products
HaloITSM
- up to 2.146.1
Source
vulnerability@ncsc.ch
Tags
CVE-2024-6202 details
Published : Aug. 6, 2024, 6:15 a.m.
Last Modified : Aug. 6, 2024, 4:30 p.m.
Last Modified : Aug. 6, 2024, 4:30 p.m.
Description
HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.8 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-863 | Incorrect Authorization | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.8
Exploitability Score
3.9
Impact Score
5.9
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://haloitsm.com/guides/article/?kbid=2154 | vulnerability@ncsc.ch |
This website uses the NVD API, but is not approved or certified by it.