Lucene search

K
AmazonData.all1.0.0

5 matches found

CVE
CVE
added 2024/11/09 1:15 a.m.75 views

CVE-2024-52311

Authentication tokens issued via Cognito in data.all are not invalidated on log out, allowing for previously authenticated user to continue execution of authorized API Requests until token is expired.

6.3CVSS6.4AI score0.00181EPSS
CVE
CVE
added 2024/11/09 1:15 a.m.38 views

CVE-2024-10953

An authenticated data.all user is able to perform mutating UPDATE operations on persisted Notification records in data.all for group notifications that their user is not a member of.

5.3CVSS4.5AI score0.00089EPSS
CVE
CVE
added 2024/11/09 1:15 a.m.38 views

CVE-2024-52312

Due to inconsistent authorization permissions, data.all may allow an external actor with an authenticated account to perform restricted operations against DataSets and Environments.

5.4CVSS5.4AI score0.001EPSS
CVE
CVE
added 2024/11/09 1:15 a.m.38 views

CVE-2024-52314

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.

6.9CVSS5AI score0.0012EPSS
CVE
CVE
added 2024/11/09 1:15 a.m.35 views

CVE-2024-52313

An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.

5.3CVSS4.3AI score0.00085EPSS