A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All deployments with Runtime Custom Setting *DataStorage.UseNewQueryHandler* set to False). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf | Mitigation Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-03-08 04:15
Updated : 2022-05-13 10:25
NVD link : CVE-2022-24309
Mitre link : CVE-2022-24309
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
mendix
- mendix