Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0.
References
Configurations
History
04 Jan 2024, 19:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:amazon:awslabs_sandbox_accounts_for_events:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
References | () https://github.com/awslabs/sandbox-accounts-for-events/commit/f30a0662f0a28734eb33c5868cccc1c319eb6e79 - Patch | |
References | () https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-p7w3-j66h-m7mx - Third Party Advisory |
22 Dec 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-22 22:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-51386
Mitre link : CVE-2023-51386
CVE.ORG link : CVE-2023-51386
JSON object : View
Products Affected
amazon
- awslabs_sandbox_accounts_for_events
CWE
CWE-269
Improper Privilege Management