An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
References
Configurations
History
14 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-639 |
14 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Sep 2025, 14:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - Vendor Advisory | |
| References | () https://github.com/data-dot-all/dataall/security/advisories/GHSA-hx8q-7wxv-6c7c - Vendor Advisory | |
| CPE | cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:* | |
| First Time |
Amazon
Amazon data.all |
Information
Published : 2024-11-09 01:15
Updated : 2025-10-14 20:15
NVD link : CVE-2024-52313
Mitre link : CVE-2024-52313
CVE.ORG link : CVE-2024-52313
JSON object : View
Products Affected
amazon
- data.all
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
