{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2024-21893","title":"Title"},{"category":"description","text":"A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2024-21893","url":"https://www.suse.com/security/cve/CVE-2024-21893"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1227098 for CVE-2024-21893","url":"https://bugzilla.suse.com/1227098"}],"title":"SUSE CVE CVE-2024-21893","tracking":{"current_release_date":"2025-02-16T05:22:22Z","generator":{"date":"2024-06-26T23:25:19Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2024-21893","initial_release_date":"2024-06-26T23:25:19Z","revision_history":[{"date":"2024-06-26T23:25:19Z","number":"2","summary":"Current version"},{"date":"2025-01-01T01:30:55Z","number":"3","summary":"Current version"},{"date":"2025-02-14T05:29:24Z","number":"4","summary":"Current version"},{"date":"2025-02-16T05:22:22Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}