CVE-2024-52313

An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*

History

14 Oct 2025, 20:15

Type Values Removed Values Added
CWE CWE-863 CWE-639

14 Oct 2025, 19:15

Type Values Removed Values Added
References
  • () https://github.com/data-dot-all/dataall/releases/tag/v2.6.1 -

19 Sep 2025, 14:18

Type Values Removed Values Added
References () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - Vendor Advisory
References () https://github.com/data-dot-all/dataall/security/advisories/GHSA-hx8q-7wxv-6c7c - () https://github.com/data-dot-all/dataall/security/advisories/GHSA-hx8q-7wxv-6c7c - Vendor Advisory
CPE cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*
First Time Amazon
Amazon data.all

Information

Published : 2024-11-09 01:15

Updated : 2025-10-14 20:15


NVD link : CVE-2024-52313

Mitre link : CVE-2024-52313

CVE.ORG link : CVE-2024-52313


JSON object : View

Products Affected

amazon

  • data.all
CWE
CWE-639

Authorization Bypass Through User-Controlled Key