Количество 3
Количество 3
CVE-2024-49756
AshPostgres is the PostgreSQL data layer for Ash Framework. Starting in version 2.0.0 and prior to version 2.4.10, in certain very specific situations, it was possible for the policies of an update action to be skipped. This occurred only on "empty" update actions (no changing fields), and would allow their hooks (side effects) to be performed when they should not have been. Note that this does not allow reading new data that the user should not have had access to, only triggering a side effect a user should not have been able to trigger. To be vulnerable, an affected user must have an update action that is on a resource with no attributes containing an "update default" (updated_at timestamp, for example); can be performed atomically; does not have `require_atomic? false`; has at least one authorizer (typically `Ash.Policy.Authorizer`); and has at least one `change` (on the resource's `changes` block or in the action itself). This is where the side-effects would be performed when they
GHSA-hf59-7rwq-785m
In AshPostgres, empty, atomic, non-bulk actions, policy bypass for side-effects vulnerability.
BDU:2024-10824
Уязвимость расширения использования базы данных PostgreSQL Ash Postgres фреймворка Ash Framework, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-49756 AshPostgres is the PostgreSQL data layer for Ash Framework. Starting in version 2.0.0 and prior to version 2.4.10, in certain very specific situations, it was possible for the policies of an update action to be skipped. This occurred only on "empty" update actions (no changing fields), and would allow their hooks (side effects) to be performed when they should not have been. Note that this does not allow reading new data that the user should not have had access to, only triggering a side effect a user should not have been able to trigger. To be vulnerable, an affected user must have an update action that is on a resource with no attributes containing an "update default" (updated_at timestamp, for example); can be performed atomically; does not have `require_atomic? false`; has at least one authorizer (typically `Ash.Policy.Authorizer`); and has at least one `change` (on the resource's `changes` block or in the action itself). This is where the side-effects would be performed when they | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
GHSA-hf59-7rwq-785m In AshPostgres, empty, atomic, non-bulk actions, policy bypass for side-effects vulnerability. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
BDU:2024-10824 Уязвимость расширения использования базы данных PostgreSQL Ash Postgres фреймворка Ash Framework, позволяющая нарушителю выполнить произвольный код | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу