Data Manipulation Vulnerability in Mendix Runtime Software
CVE-2022-24309
8.1HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 8 March 2022
Summary
A vulnerability exists in Mendix Runtime that allows unauthorized access to sensitive data due to insufficient checks for XPath constraints in certain apps. Specifically, when an entity has an association readable by the user, the affected versions of Mendix Runtime may fail to enforce necessary security measures. This weakness can be exploited by a malicious user to dump and manipulate confidential information stored within applications, posing significant risks to data integrity and confidentiality.
Affected Version(s)
Mendix Runtime V7 0
Mendix Runtime V8 0
Mendix Runtime V9 0
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved