Kiuwan provides an API endpoint
/saas/rest/v1/info/application
to get information about any
application, providing only its name via the "application" parameter. This endpoint lacks proper access
control mechanisms, allowing other authenticated users to read
information about applications, even though they have not been granted
the necessary rights to do so.
This issue affects Kiuwan SAST: <master.1808.p685.q13371
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-06-20T12:36:18.575Z
Updated: 2024-08-02T21:46:29.305Z
Reserved: 2023-11-22T11:08:37.654Z
Link: CVE-2023-49112
Vulnrichment
Updated: 2024-08-02T21:46:29.305Z
NVD
Status : Awaiting Analysis
Published: 2024-06-20T13:15:49.480
Modified: 2024-07-03T01:42:26.830
Link: CVE-2023-49112
Redhat
No data.