2.x and 3.x
Several issues have been identified in the TCA 2.x and 3.x :
The TCA application utilizes third-party libraries with known vulnerabilities (e.g., MomentJS, JQueryUI, AngularJS, DOMPurify) that expose it to high-risk CVEs, including ReDOS attacks, XSS vulnerabilities, and code injection risks.
The software contains outdated versions (e.g., SwaggerUI, Apache, GLIBC) that are susceptible to vulnerabilities such as SSRF, Denial of Service (DoS), and privilege escalation.
Access control mechanisms in TCA are insufficient, allowing users to access unauthorized data or perform actions beyond their intended roles.
Verbose error messages are being returned to users, exposing stack traces and sensitive server information that could aid attackers in exploiting weaknesses.
Passwords are stored in cleartext or base64 encoded in logs, which could allow attackers to gain access to critical data or escalate privileges.
Although not directly applicable to TCA, the system lacks brute force protection because it relies on an external identity provider. This is not an issue specific to the TCA platform.