Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
References
Link | Resource |
---|---|
https://www.apiman.io/blog/permissions-bypass-disclosure/ | Vendor Advisory |
https://www.github.com/apiman/apiman | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-12-19T00:00:00
Updated: 2022-12-19T00:00:00
Reserved: 2022-12-19T00:00:00
Link: CVE-2022-47551
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-20T00:15:10.050
Modified: 2022-12-27T18:38:31.363
Link: CVE-2022-47551
JSON object: View
Redhat Information
No data.
CWE