CVE-2022-24309
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions < V9.13 only with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
Se ha identificado una vulnerabilidad en las aplicaciones de Mendix que utilizan Mendix 7 (todas las versiones anteriores a V7.23.29), las aplicaciones de Mendix que utilizan Mendix 8 (todas las versiones anteriores a V8.18.16) y las aplicaciones de Mendix que utilizan Mendix 9 (todas las implementaciones con la configuración personalizada del tiempo de ejecución *DataStorage.UseNewQueryHandler* establecida en False). Si una entidad tiene una asociación legible por el usuario, en algunos casos, Mendix Runtime puede no aplicar las comprobaciones de las restricciones XPath que analizan dichas asociaciones, dentro de las aplicaciones que se ejecutan en las versiones afectadas. Un usuario malintencionado podría utilizar esto para volcar y manipular datos sensibles
A vulnerability has been identified in Mendix Runtime V7 (All versions < V7.23.29), Mendix Runtime V8 (All versions < V8.18.16), Mendix Runtime V9 (All versions < V9.13 only with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-02 CVE Reserved
- 2022-03-08 CVE Published
- 2023-09-29 EPSS Updated
- 2024-10-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
References (2)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf | 2024-05-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mendix Search vendor "Mendix" | Mendix Search vendor "Mendix" for product "Mendix" | < 7.23.29 Search vendor "Mendix" for product "Mendix" and version " < 7.23.29" | - |
Affected
| ||||||
Mendix Search vendor "Mendix" | Mendix Search vendor "Mendix" for product "Mendix" | >= 8.0.0 < 8.18.16 Search vendor "Mendix" for product "Mendix" and version " >= 8.0.0 < 8.18.16" | - |
Affected
| ||||||
Mendix Search vendor "Mendix" | Mendix Search vendor "Mendix" for product "Mendix" | >= 9.0.0 Search vendor "Mendix" for product "Mendix" and version " >= 9.0.0" | - |
Affected
|