CVE-2022-47551

Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apiman:apiman:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:32

Type Values Removed Values Added
References () https://www.apiman.io/blog/permissions-bypass-disclosure/ - Vendor Advisory () https://www.apiman.io/blog/permissions-bypass-disclosure/ - Vendor Advisory
References () https://www.github.com/apiman/apiman - Third Party Advisory () https://www.github.com/apiman/apiman - Third Party Advisory

Information

Published : 2022-12-20 00:15

Updated : 2024-11-21 07:32


NVD link : CVE-2022-47551

Mitre link : CVE-2022-47551

CVE.ORG link : CVE-2022-47551


JSON object : View

Products Affected

apiman

  • apiman
CWE
CWE-276

Incorrect Default Permissions