Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3cvf-5chq-5r99

Опубликовано: 14 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether the authenticated user had permission to access the specified MongoDB object ID. By specifying particlar MongoDB object IDs, callers could obtain records for other users without proper authorization. Records retrievable using this attack included administrative API keys and private studio api keys.

When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether the authenticated user had permission to access the specified MongoDB object ID. By specifying particlar MongoDB object IDs, callers could obtain records for other users without proper authorization. Records retrievable using this attack included administrative API keys and private studio api keys.

EPSS

Процентиль: 9%
0.00033
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-639
CWE-648

Связанные уязвимости

CVSS3: 5.4
nvd
3 месяца назад

When processing API requests, the Alteryx server 2022.1.1.42654 and 2024.1 used MongoDB object IDs to uniquely identify the data being requested by the caller. The Alteryx server did not check whether the authenticated user had permission to access the specified MongoDB object ID. By specifying particlar MongoDB object IDs, callers could obtain records for other users without proper authorization. Records retrievable using this attack included administrative API keys and private studio api keys.

EPSS

Процентиль: 9%
0.00033
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-639
CWE-648