CVE-2023-49112

Kiuwan provides an API endpoint /saas/rest/v1/info/application to get information about any application, providing only its name via the "application" parameter. This endpoint lacks proper access control mechanisms, allowing other authenticated users to read information about applications, even though they have not been granted the necessary rights to do so. This issue affects Kiuwan SAST: <master.1808.p685.q13371
Configurations

No configuration.

History

21 Nov 2024, 08:32

Type Values Removed Values Added
References () https://r.sec-consult.com/kiuwan - () https://r.sec-consult.com/kiuwan -
References () https://www.kiuwan.com/docs/display/K5/%5B2024-05-30%5D+Change+Log - () https://www.kiuwan.com/docs/display/K5/%5B2024-05-30%5D+Change+Log -

03 Jul 2024, 01:42

Type Values Removed Values Added
CWE CWE-639
Summary
  • (es) Kiuwan proporciona un endpoint API /saas/rest/v1/info/application para obtener información sobre cualquier aplicación, proporcionando solo su nombre a través del parámetro "application". Este endpoint carece de mecanismos de control de acceso adecuados, lo que permite a otros usuarios autenticados leer información sobre las aplicaciones, aunque no se les hayan otorgado los derechos necesarios para hacerlo. Este problema afecta a Kiuwan SAST:
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

20 Jun 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 13:15

Updated : 2024-11-21 08:32


NVD link : CVE-2023-49112

Mitre link : CVE-2023-49112

CVE.ORG link : CVE-2023-49112


JSON object : View

Products Affected

No product.

CWE
CWE-639

Authorization Bypass Through User-Controlled Key