An authentication bypass vulnerability exists in ETQ Reliance on the CG (legacy) platform. The application allowed login as the privileged internal SYSTEM user by manipulating the username field. The SYSTEM account does not require a password, enabling attackers with network access to the login page to obtain elevated access. Once authenticated, an attacker could achieve remote code execution by modifying Jython scripts within the application. This issue was resolved by introducing stricter validation logic to exclude internal accounts from public authentication workflows in version MP-4583.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 22 Jul 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authentication bypass vulnerability exists in ETQ Reliance on the CG (legacy) platform. The application allowed login as the privileged internal SYSTEM user by manipulating the username field. The SYSTEM account does not require a password, enabling attackers with network access to the login page to obtain elevated access. Once authenticated, an attacker could achieve remote code execution by modifying Jython scripts within the application. This issue was resolved by introducing stricter validation logic to exclude internal accounts from public authentication workflows in version MP-4583. | |
Title | ETQ Reliance CG Authentication Bypass via Trailing Space RCE | |
Weaknesses | CWE-269 CWE-288 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-22T12:31:35.570Z
Updated: 2025-07-22T13:30:32.106Z
Reserved: 2025-04-15T19:15:22.564Z
Link: CVE-2025-34143

Updated: 2025-07-22T13:30:25.226Z

Status : Awaiting Analysis
Published: 2025-07-22T13:15:25.107
Modified: 2025-07-25T15:29:44.523
Link: CVE-2025-34143

No data.