An authentication bypass vulnerability is present in the standalone SITS:Vision 9.7.0 component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This occurs because the Uniface TLS Driver is not enabled by default. This vulnerability allows attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Mar/26 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Mar/26 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Mar/26 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Mar/26 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/Mar/26 - Mailing List, Third Party Advisory |
Information
Published : 2020-03-25 15:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19127
Mitre link : CVE-2019-19127
CVE.ORG link : CVE-2019-19127
JSON object : View
Products Affected
tribalgroup
- sits\
CWE
CWE-319
Cleartext Transmission of Sensitive Information