Skip to content

Commit

Permalink
Merge pull request #3 from OOsipova/master
Browse files Browse the repository at this point in the history
Vulnerabilities in Centrify PAS
  • Loading branch information
klsecurityservices authored Jul 2, 2024
2 parents 31c72f2 + bfc5cb5 commit 1c1b0a1
Show file tree
Hide file tree
Showing 2 changed files with 59 additions and 0 deletions.
29 changes: 29 additions & 0 deletions K-Delinea-2023-001.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
***
# Kaspersky Advisory
## (K-Delinea-2023-001) Arbitrary File Reading in Centrify PAS
***
### Affected Hardware/Software
Centrify PAS v. 21.3 and possibly others
### Severity level
Impact: This vulnerability may allow to dump credentials for DB or even dump entire local DB. Also an attacker may retrieve encryption keys for stored credentials.

Access Vector: The vulnerability can be exploited by any authorized user with network access.
### CVSS v3 Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
### CVSS v3 Score

7.7
### CVE ID

CVE-2024-5865
### Vulnerability description
The application is prone to the path traversal vulnerability allowing arbitrary files reading outside the web publish directory.
### Remediation
Apply patch from vendor. Versions 23.1-HF7 and on have the patch.
### Acknowledgements
The vulnerability was discovered by Vladas Bulavas from Kaspersky

### References
https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-001.md

30 changes: 30 additions & 0 deletions K-Delinea-2023-002.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
***
# Kaspersky Advisory
## (K-Delinea-2023-002) Arbitrary Directory Listing in Centrify PAS
***
### Affected Hardware/Software
Centrify PAS v. 21.3 and possibly others
### Severity level
Impact: This vulnerability may allow to get sensitive information from filenames and may help to exploit arbitrary file reading vulnerability.

Access Vector: The vulnerability can be exploited by any authorized user with network access.
### CVSS v3 Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
### CVSS v3 Score

5.0
### CVE ID

CVE-2024-5866
### Vulnerability description
The application is prone to the path traversal vulnerability allowing listing of arbitrary directory outside the root directory of the web application.
### Remediation
Apply patch from vendor. Versions 23.1-HF7 and on have the patch.
### Acknowledgements
The vulnerability was discovered by Vladas Bulavas from Kaspersky
### References
https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-002.md



0 comments on commit 1c1b0a1

Please sign in to comment.