Описание
A vulnerability has been identified in Mendix Runtime V7 (All versions < V7.23.29), Mendix Runtime V8 (All versions < V8.18.16), Mendix Runtime V9 (All versions < V9.13 only with Runtime Custom Setting DataStorage.UseNewQueryHandler set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
Ссылки
- Vendor Advisory
- MitigationRelease NotesVendor Advisory
- Vendor Advisory
- MitigationRelease NotesVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
6.8 Medium
CVSS3
8.1 High
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
EPSS
6.8 Medium
CVSS3
8.1 High
CVSS3
4.9 Medium
CVSS2