icon

We found results for “

CVE-2023-28640

Good to know:

icon
icon

Date: March 27, 2023

Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Improper Privilege Management

CWE-269

Missing Authorization

CWE-862

Improper Handling of Insufficient Permissions or Privileges

CWE-280

Top Fix

icon

Upgrade Version

Upgrade to version io.apiman:apiman-manager-api-rest-impl:3.1.0.Final

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us