cvelist/2022/24xxx/CVE-2022-24309.json

82 lines
3.1 KiB
JSON
Raw Normal View History

2022-02-02 11:01:18 +00:00
{
"CVE_data_meta": {
2022-03-08 12:29:13 +01:00
"ASSIGNER": "productcert@siemens.com",
2022-02-02 11:01:18 +00:00
"ID": "CVE-2022-24309",
2022-03-08 12:29:13 +01:00
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Mendix Applications using Mendix 7",
"version": {
"version_data": [
{
"version_value": "All versions < V7.23.29"
}
]
}
},
{
"product_name": "Mendix Applications using Mendix 8",
"version": {
"version_data": [
{
"version_value": "All versions < V8.18.16"
}
]
}
},
{
"product_name": "Mendix Applications using Mendix 9",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control"
}
]
}
]
2022-02-02 11:01:18 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-03-08 12:29:13 +01:00
"value": "A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data."
}
]
},
"references": {
"reference_data": [
{
2022-03-10 17:25:56 +00:00
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf"
2022-02-02 11:01:18 +00:00
}
]
}
}