An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-45842 An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Fixes

Solution

A fix for this issue is available in data.all version 2.6.1 and later. Customers are advised to upgrade to version 2.6.1 or later.


Workaround

No workaround given by the vendor.

History

Tue, 14 Oct 2025 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863

Tue, 14 Oct 2025 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-639

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
References

Fri, 19 Sep 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon data.all
CPEs cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*
Vendors & Products Amazon
Amazon data.all

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00052}

epss

{'score': 0.00056}


Wed, 13 Nov 2024 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 09 Nov 2024 01:30:00 +0000


Sat, 09 Nov 2024 01:00:00 +0000

Type Values Removed Values Added
Description An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Title data.all authenticated users can obtain incorrect object level authorizations
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2025-10-14T19:26:56.176Z

Reserved: 2024-11-06T21:02:34.355Z

Link: CVE-2024-52313

cve-icon Vulnrichment

Updated: 2024-11-12T15:14:27.447Z

cve-icon NVD

Status : Modified

Published: 2024-11-09T01:15:05.363

Modified: 2025-10-14T20:15:32.973

Link: CVE-2024-52313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.