CVE-2022-24309

A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions < V9.13 only with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*
cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*
cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*

History

14 May 2024, 16:15

Type Values Removed Values Added
References
  • () https://cert-portal.siemens.com/productcert/html/ssa-148641.html -
Summary (en) A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All deployments with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data. (en) A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions < V9.13 only with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.

30 Jun 2023, 18:47

Type Values Removed Values Added
CWE CWE-668 NVD-CWE-Other

13 May 2022, 17:25

Type Values Removed Values Added
CVSS v2 : 5.5
v3 : 8.1
v2 : 4.9
v3 : 8.1

12 Apr 2022, 09:15

Type Values Removed Values Added
Summary A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data. A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All deployments with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.

11 Mar 2022, 18:46

Type Values Removed Values Added
First Time Mendix
Mendix mendix
CWE CWE-668
CVSS v2 : unknown
v3 : unknown
v2 : 5.5
v3 : 8.1
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf - Mitigation, Release Notes, Vendor Advisory
CPE cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*

08 Mar 2022, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-08 12:15

Updated : 2024-05-14 16:15


NVD link : CVE-2022-24309

Mitre link : CVE-2022-24309

CVE.ORG link : CVE-2022-24309


JSON object : View

Products Affected

mendix

  • mendix
CWE
NVD-CWE-Other CWE-284

Improper Access Control