Assigner | siemens |
Reserved | 2022-02-02 |
Published | 2022-03-08 |
Updated | 2024-05-15 |
Description
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions < V9.13 only with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C |
Problem types
CWE-284: Improper Access Control
Product status
Any version before V7.23.29
Any version before V8.18.16
Any version before V9.13
References
https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf
https://cert-portal.siemens.com/productcert/html/ssa-148641.html