Warpgate is an SSH, HTTPS and MySQL bastion host for Linux that doesn't need special client apps. When logging in as a user with SSO enabled an attacker may authenticate as an other user. Any user account which does not have a second factor enabled could be compromised. This issue has been addressed in commit `8173f6512a` and in releases starting with version 0.7.3. Users are advised to upgrade. Users unable to upgrade should require their users to use a second factor in authentication.
History

Fri, 18 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:warpgate_project:warpgate:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-07-14T21:02:00.786Z

Updated: 2024-10-18T17:41:24.928Z

Reserved: 2023-06-29T19:35:26.438Z

Link: CVE-2023-37268

cve-icon Vulnrichment

Updated: 2024-08-02T17:09:33.241Z

cve-icon NVD

Status : Modified

Published: 2023-07-14T22:15:09.317

Modified: 2024-11-21T08:11:21.493

Link: CVE-2023-37268

cve-icon Redhat

No data.