We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52314

data.all admin user may access potentially sensitive data stored by producers via logs



Description

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.

Reserved 2024-11-06 | Published 2024-11-09 | Updated 2024-11-12 | Assigner AMZN


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 4.9CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

1.0.0
affected

References

aws.amazon.com/security/security-bulletins/AWS-2024-013 vendor-advisory

github.com/...ataall/security/advisories/GHSA-p2h8-r28g-5q6h third-party-advisory

cve.org (CVE-2024-52314)

nvd.nist.gov (CVE-2024-52314)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52314

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.