Логотип exploitDog
bind:CVE-2024-49756
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-49756

Количество 3

Количество 3

nvd логотип

CVE-2024-49756

больше 1 года назад

AshPostgres is the PostgreSQL data layer for Ash Framework. Starting in version 2.0.0 and prior to version 2.4.10, in certain very specific situations, it was possible for the policies of an update action to be skipped. This occurred only on "empty" update actions (no changing fields), and would allow their hooks (side effects) to be performed when they should not have been. Note that this does not allow reading new data that the user should not have had access to, only triggering a side effect a user should not have been able to trigger. To be vulnerable, an affected user must have an update action that is on a resource with no attributes containing an "update default" (updated_at timestamp, for example); can be performed atomically; does not have `require_atomic? false`; has at least one authorizer (typically `Ash.Policy.Authorizer`); and has at least one `change` (on the resource's `changes` block or in the action itself). This is where the side-effects would be performed when they

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hf59-7rwq-785m

больше 1 года назад

In AshPostgres, empty, atomic, non-bulk actions, policy bypass for side-effects vulnerability.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-10824

больше 1 года назад

Уязвимость расширения использования базы данных PostgreSQL Ash Postgres фреймворка Ash Framework, позволяющая нарушителю выполнить произвольный код

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-49756

AshPostgres is the PostgreSQL data layer for Ash Framework. Starting in version 2.0.0 and prior to version 2.4.10, in certain very specific situations, it was possible for the policies of an update action to be skipped. This occurred only on "empty" update actions (no changing fields), and would allow their hooks (side effects) to be performed when they should not have been. Note that this does not allow reading new data that the user should not have had access to, only triggering a side effect a user should not have been able to trigger. To be vulnerable, an affected user must have an update action that is on a resource with no attributes containing an "update default" (updated_at timestamp, for example); can be performed atomically; does not have `require_atomic? false`; has at least one authorizer (typically `Ash.Policy.Authorizer`); and has at least one `change` (on the resource's `changes` block or in the action itself). This is where the side-effects would be performed when they

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-hf59-7rwq-785m

In AshPostgres, empty, atomic, non-bulk actions, policy bypass for side-effects vulnerability.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-10824

Уязвимость расширения использования базы данных PostgreSQL Ash Postgres фреймворка Ash Framework, позволяющая нарушителю выполнить произвольный код

CVSS3: 5.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу