Описание
Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.5.7 (включая) до 2.2.3 (включая)
cpe:2.3:a:apiman:apiman:*:*:*:*:*:*:*:*
EPSS
Процентиль: 19%
0.00062
Низкий
6.5 Medium
CVSS3
Дефекты
CWE-276
CWE-276
Связанные уязвимости
EPSS
Процентиль: 19%
0.00062
Низкий
6.5 Medium
CVSS3
Дефекты
CWE-276
CWE-276