CVE-2021-27394
https://notcve.org/view.php?id=CVE-2021-27394
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.19), Mendix Applications using Mendix 8 (All versions < V8.17.0), Mendix Applications using Mendix 8 (V8.12) (All versions < V8.12.5), Mendix Applications using Mendix 8 (V8.6) (All versions < V8.6.9), Mendix Applications using Mendix 9 (All versions < V9.0.5). Authenticated, non-administrative users could modify their privileges by manipulating the user role under certain circumstances, allowing them to gain administrative privileges. Se ha identificado una vulnerabilidad en Mendix Applications usando Mendix 7 (todas las versiones anteriores a V7.23.19), Mendix Applications usando Mendix 8 (todas las versiones anteriores a V8.17.0), Mendix Applications usando Mendix 8 (V8.12) (todas las versiones anteriores a V8. 12.5), Mendix Applications usando Mendix 8 (V8.6) (Todas las versiones anteriores a V8.6.9), Mendix Applications usando Mendix 9 (Todas las versiones anteriores a V9.0.5). Los usuarios no administrativos autenticados pueden modificar sus privilegios al manipular la función del usuario en determinadas circunstancias, permitiéndoles alcanzar privilegios administrativos • https://cert-portal.siemens.com/productcert/pdf/ssa-875726.pdf • CWE-269: Improper Privilege Management •
CVE-2021-25672
https://notcve.org/view.php?id=CVE-2021-25672
A vulnerability has been identified in Mendix Forgot Password Appstore module (All Versions < V3.2.1). The Forgot Password Marketplace module does not properly control access. An attacker could take over accounts. Se ha identificado una vulnerabilidad en el módulo Mendix Forgot Password Appstore (Todas las versiones anteriores a V3.2.1). El módulo de Marketplace Forgot Password no controla el acceso apropiadamente. • https://cert-portal.siemens.com/productcert/pdf/ssa-917115.pdf • CWE-284: Improper Access Control •
CVE-2020-8160
https://notcve.org/view.php?id=CVE-2020-8160
MendixSSO <= 2.1.1 contains endpoints that make use of the openid handler, which is suffering from a Cross-Site Scripting vulnerability via the URL path. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser. MendixSSO versiones anteriores a 2.1.1 incluyéndola, contiene endpoints que hacen uso del manejador openid, el cual sufre una vulnerabilidad de tipo Cross-Site Scripting por medio de la ruta URL. Esto es causado por el reflejo de los datos suministrados por el usuario sin la codificación de salida o escape HTML apropiado. • https://hackerone.com/reports/838178 https://marketplace.mendix.com/link/component/111349 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-12996
https://notcve.org/view.php?id=CVE-2019-12996
In Mendix 7.23.5 and earlier, issue in XML import mappings allow DOCTYPE declarations in the XML input that is potentially unsafe. En Mendix versiones 7.23.5 y anteriores, el módulo importador de Excel es vulnerable a un ataque de tipo SSRF, lo que permite a atacantes diseñar peticiones desde servidores de Mendix hacia cualquier destino en Internet o una red interna de Mendix, llevar a cabo escaneos de puertos y revelar listas de archivos ubicados en servidores de Mendix. • https://docs.mendix.com/releasenotes/studio-pro/7.23#7236 • CWE-918: Server-Side Request Forgery (SSRF) •