CVE-2024-52314

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*

History

14 Oct 2025, 19:15

Type Values Removed Values Added
References
  • () https://github.com/data-dot-all/dataall/releases/tag/v2.6.1 -

19 Sep 2025, 14:18

Type Values Removed Values Added
References () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - Vendor Advisory
References () https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h - () https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h - Vendor Advisory
First Time Amazon
Amazon data.all
CPE cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*

Information

Published : 2024-11-09 01:15

Updated : 2025-10-14 19:15


NVD link : CVE-2024-52314

Mitre link : CVE-2024-52314

CVE.ORG link : CVE-2024-52314


JSON object : View

Products Affected

amazon

  • data.all
CWE
CWE-863

Incorrect Authorization