← Back to CVEs
CVE-2022-26317
MEDIUM6.5
Description
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29). When returning the result of a completed Microflow execution call the affected framework does not correctly verify, if the request was initially made by the user requesting the result. Together with predictable identifiers for Microflow execution calls, this could allow a malicious attacker to retrieve information about arbitrary Microflow execution calls made by users within the affected system.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/8/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
mendix:mendix
Weaknesses (CWE)
CWE-284CWE-330
References
https://cert-portal.siemens.com/productcert/pdf/ssa-415938.pdf(productcert@siemens.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-415938.pdf(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.