CVE Vulnerabilities

CVE-2010-1596

Improper Authentication

Published: Apr 28, 2010 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Support Incident Tracker before 3.51, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Support_incident_trackerSitracker*3.50 (including)
Support_incident_trackerSitracker3.21 (including)3.21 (including)
Support_incident_trackerSitracker3.22 (including)3.22 (including)
Support_incident_trackerSitracker3.22pl1 (including)3.22pl1 (including)
Support_incident_trackerSitracker3.23 (including)3.23 (including)
Support_incident_trackerSitracker3.24 (including)3.24 (including)
Support_incident_trackerSitracker3.24-beta-2 (including)3.24-beta-2 (including)
Support_incident_trackerSitracker3.30 (including)3.30 (including)
Support_incident_trackerSitracker3.30-beta2 (including)3.30-beta2 (including)
Support_incident_trackerSitracker3.31 (including)3.31 (including)
Support_incident_trackerSitracker3.32 (including)3.32 (including)
Support_incident_trackerSitracker3.33 (including)3.33 (including)
Support_incident_trackerSitracker3.35 (including)3.35 (including)
Support_incident_trackerSitracker3.35-beta1 (including)3.35-beta1 (including)
Support_incident_trackerSitracker3.36 (including)3.36 (including)
Support_incident_trackerSitracker3.40 (including)3.40 (including)
Support_incident_trackerSitracker3.40-beta1 (including)3.40-beta1 (including)
Support_incident_trackerSitracker3.41 (including)3.41 (including)
Support_incident_trackerSitracker3.45 (including)3.45 (including)
Support_incident_trackerSitracker3.45-beta1 (including)3.45-beta1 (including)
Support_incident_trackerSitracker3.50-beta1 (including)3.50-beta1 (including)

Potential Mitigations

References