← Voltar para CVEs
CVE-2024-52314
MEDIUM4.9
Descricao
A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Detalhes CVE
Pontuacao CVSS v3.14.9
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado11/9/2024
Ultima modificacao10/14/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
amazon:data.all
Fraquezas (CWE)
CWE-863
Referencias
https://aws.amazon.com/security/security-bulletins/AWS-2024-013(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/data-dot-all/dataall/releases/tag/v2.6.1(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h(ff89ba41-3aa1-4d27-914a-91399e9639e5)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.