Vulnerabilities
Vulnerable Software
Amazon:  >> Data.all  >> 1.2.0  Security Vulnerabilities
An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
CVSS Score
4.3
EPSS Score
0.001
Published
2024-11-09
A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
CVSS Score
4.9
EPSS Score
0.001
Published
2024-11-09
Authentication tokens issued via Cognito in data.all are not invalidated on log out, allowing for previously authenticated user to continue execution of authorized API Requests until token is expired.
CVSS Score
6.3
EPSS Score
0.003
Published
2024-11-09
Due to inconsistent authorization permissions, data.all may allow an external actor with an authenticated account to perform restricted operations against DataSets and Environments.
CVSS Score
5.4
EPSS Score
0.001
Published
2024-11-09
An authenticated data.all user is able to perform mutating UPDATE operations on persisted Notification records in data.all for group notifications that their user is not a member of.
CVSS Score
4.3
EPSS Score
0.001
Published
2024-11-09


Contact Us

Shodan ® - All rights reserved