CVE-2023-49112
June 20, 2024, 4:07 p.m.
None
No Score
Description
Kiuwan provides an API endpoint
/saas/rest/v1/info/application
to get information about any
application, providing only its name via the "application" parameter. This endpoint lacks proper access
control mechanisms, allowing other authenticated users to read
information about applications, even though they have not been granted
the necessary rights to do so.
This issue affects Kiuwan SAST: <master.1808.p685.q13371
Product(s) Impacted
| Product | Versions |
|---|---|
| Kiuwan SAST |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
Timeline
Published: June 20, 2024, 1:15 p.m.
Last Modified: June 20, 2024, 4:07 p.m.
Last Modified: June 20, 2024, 4:07 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
551230f0-3615-47bd-b7cc-93e92e730bbf
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.