Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
References
Link | Resource |
---|---|
https://www.apiman.io/blog/permissions-bypass-disclosure/ | Vendor Advisory |
https://www.github.com/apiman/apiman | Third Party Advisory |
https://www.apiman.io/blog/permissions-bypass-disclosure/ | Vendor Advisory |
https://www.github.com/apiman/apiman | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.apiman.io/blog/permissions-bypass-disclosure/ - Vendor Advisory | |
References | () https://www.github.com/apiman/apiman - Third Party Advisory |
Information
Published : 2022-12-20 00:15
Updated : 2024-11-21 07:32
NVD link : CVE-2022-47551
Mitre link : CVE-2022-47551
CVE.ORG link : CVE-2022-47551
JSON object : View
Products Affected
apiman
- apiman
CWE
CWE-276
Incorrect Default Permissions