THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2023-49112

Insecure Direct Object Reference in Kiuwan SAST

Assigner:SEC-VLab
Reserved:2023-11-22
Published:2024-06-20
Updated:2024-06-20

Description

Kiuwan provides an API endpoint /saas/rest/v1/info/application to get information about any application, providing only its name via the "application" parameter. This endpoint lacks proper access control mechanisms, allowing other authenticated users to read information about applications, even though they have not been granted the necessary rights to do so. This issue affects Kiuwan SAST: <master.1808.p685.q13371

Product status

Default status
affected

affected

Credits

Constantin Schwarz finder

Johannes Greil coordinator

References

https://r.sec-consult.com/kiuwan third-party-advisory

https://www.kiuwan.com/docs/display/K5/%5B2024-05-30%5D+Change+Log release-notes

cve.org CVE-2023-49112

nvd.nist.gov CVE-2023-49112

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-49112