va-24-254-02
Vulnerability from csaf_cisa
Published
2024-09-10 16:03
Modified
2024-11-28 01:00
Summary
TopQuadrant TopBraid EDG Insecure External Password Storage and XXE Vulnerabilities
Notes
Risk Evaluation
TopQuadrant TopBraid EDG stores credentials for external services insecurely and processes untrusted XML entities. An authenticated attacker could obtain credentials for remote services, read local files, or access URLs.
Legal Notice
All information products included in https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Countries and Areas Deployed
Worldwide
Company Headquarters Location
United States
Critical Infrastructure Sectors
Information Technology
Recommended Practices
Upgrade to TopQuadrant TopBraid EDG 8.0.1 and use the Hashicorp Vault integration.
{ "document": { "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "TopQuadrant TopBraid EDG stores credentials for external services insecurely and processes untrusted XML entities. An authenticated attacker could obtain credentials for remote services, read local files, or access URLs.", "title": "Risk Evaluation" }, { "category": "legal_disclaimer", "text": "All information products included in https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "Worldwide", "title": "Countries and Areas Deployed" }, { "category": "other", "text": "United States", "title": "Company Headquarters Location" }, { "category": "other", "text": "Information Technology", "title": "Critical Infrastructure Sectors" }, { "category": "general", "text": "Upgrade to TopQuadrant TopBraid EDG 8.0.1 and use the Hashicorp Vault integration.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "https://www.cisa.gov/report", "issuing_authority": "CISA", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "Vulnerability Advisory VA-24-254-02 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-24-254-02.json" } ], "title": "TopQuadrant TopBraid EDG Insecure External Password Storage and XXE Vulnerabilities", "tracking": { "current_release_date": "2024-11-28T01:00:00Z", "generator": { "date": "2024-11-27T03:30:11Z", "engine": { "name": "Secvisogram", "version": "2.5.15" } }, "id": "VA-24-254-02", "initial_release_date": "2024-09-10T16:03:00Z", "revision_history": [ { "date": "2024-09-10T16:03:00Z", "number": "1.0.0", "summary": "Initial publication" }, { "date": "2024-10-03T10:00:00Z", "number": "1.0.1", "summary": "Correct reporter affiliation from RAF to FAST" }, { "date": "2024-11-14T01:00:00Z", "number": "1.0.2", "summary": "Fix acknowledgements, section headings, version range" }, { "date": "2024-11-27T17:00:00Z", "number": "1.0.3", "summary": "Added Hashicorp Vault mitigation, Recommended Practices section, language" } ], "status": "final", "version": "1.0.3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7.1.3", "product": { "name": "TopQuadrant TopBraid EDG 7.1.3", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "\u003c8.0.1", "product": { "name": "TopQuadrant TopBraid EDG \u003c8.0.1", "product_id": "CSAFPID-0002" } }, { "category": "product_version", "name": "8.0.1", "product": { "name": "TopQuadrant TopBraid EDG 8.0.1", "product_id": "CSAFPID-0003" } }, { "category": "product_version_range", "name": "\u003e=7.3", "product": { "name": "TopQuadrant TopBraid EDG \u003e= 7.3.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "TopBraid EDG" } ], "category": "vendor", "name": "TopQuadrant" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Donald Macary" ], "organization": "CISA Federal Attack Surface Testing" } ], "cve": "CVE-2024-45744", "cwe": { "id": "CWE-257", "name": "Storing Passwords in a Recoverable Format" }, "notes": [ { "category": "summary", "text": "TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker could gain file system access using a separate vulnerability such as CVE-2024-45745. At least version 7.1.3 is affected. Version 7.3 adds HashiCorp Vault integration that does not store external passwords locally.", "title": "Description" }, { "category": "details", "text": "SSVCv2/E:P/A:N/T:P/2024-09-10T16:16:26Z/", "title": "SSVC" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "raw.githubusercontent.com", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-24-254-02.json" }, { "category": "external", "summary": "www.topquadrant.com", "url": "https://www.topquadrant.com/doc/latest/reference/PasswordManagementAdminPage.html" }, { "category": "external", "summary": "www.topquadrant.com", "url": "https://www.topquadrant.com/doc/latest/administrator_guide/edg_installation_and_authentication/hashicorp_integration.html" }, { "category": "external", "summary": "www.topquadrant.com", "url": "https://www.topquadrant.com/release-note/7-3/" } ], "release_date": "2024-09-10T16:00:00Z", "remediations": [ { "category": "none_available", "details": "No information available.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "date": "2022-11-15T18:50:00Z", "details": "Use the [Hashicorp Vault](https://www.topquadrant.com/doc/latest/administrator_guide/edg_installation_and_authentication/hashicorp_integration.html) to store credentials. Hashicorp Vault integration was first available in TopBraid EDG [7.3.0](https://www.topquadrant.com/release-note/7-3/).", "product_ids": [ "CSAFPID-0004" ], "url": "https://www.topquadrant.com/doc/latest/administrator_guide/edg_installation_and_authentication/hashicorp_integration.html" } ], "scores": [ { "cvss_v3": { "baseScore": 3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "TopQuadrant TopBraid EDG password manager stores external credentials insecurely" }, { "acknowledgments": [ { "names": [ "Donald Macary", "Grant Hume" ], "organization": "CISA Federal Attack Surface Testing" } ], "cve": "CVE-2024-45745", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "TopQuadrant TopBraid EDG before version 8.0.1 allows an authenticated attacker to upload an XML DTD file and execute JavaScript to read local files or access URLs (XXE). Fixed in 8.0.1 (bug fix: TBS-6721).", "title": "Description" }, { "category": "details", "text": "SSVCv2/E:P/A:N/T:P/2024-09-10T15:30:07Z/", "title": "SSVC" }, { "category": "description", "text": "EDG 8.0 and earlier are susceptible to XXE injection if a malicious XML DTD is uploaded to the Script Editor. An authenticated user could read arbitrary system files or make web requests as the EDG server. This has been fixed in version 8.0.1 (Bug fix: TBS-6721: Fix a number of XXE vulnerabilities).", "title": "Vendor statement" } ], "product_status": { "fixed": [ "CSAFPID-0003" ], "known_affected": [ "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "raw.githubusercontent.com", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-24-254-02.json" }, { "category": "external", "summary": "www.topquadrant.com", "url": "https://www.topquadrant.com/wp-content/uploads/2024/06/changelog-8.0.1.txt" } ], "release_date": "2024-09-10T16:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Fixed in 8.0.1 (bug fix: TBS-6721).", "product_ids": [ "CSAFPID-0002" ], "url": "https://www.topquadrant.com/wp-content/uploads/2024/06/changelog-8.0.1.txt" }, { "category": "vendor_fix", "details": "Fixed in 8.0.1 (bug fix: TBS-6721).", "product_ids": [ "CSAFPID-0003" ], "url": "https://www.topquadrant.com/wp-content/uploads/2024/06/changelog-8.0.1.txt" } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "TopQuadrant TopBraid EDG JavaScript console XXE" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.