Amazon

Data.All

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 09.11.2024 01:15:05
  • Zuletzt bearbeitet 14.10.2025 20:15:32

An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in da...

  • EPSS 0.14%
  • Veröffentlicht 09.11.2024 01:15:05
  • Zuletzt bearbeitet 14.10.2025 19:15:37

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact w...

  • EPSS 0.25%
  • Veröffentlicht 09.11.2024 01:15:04
  • Zuletzt bearbeitet 14.10.2025 20:15:32

Authentication tokens issued via Cognito in data.all are not invalidated on log out, allowing for previously authenticated user to continue execution of authorized API Requests until token is expired.

  • EPSS 0.15%
  • Veröffentlicht 09.11.2024 01:15:04
  • Zuletzt bearbeitet 14.10.2025 19:15:36

Due to inconsistent authorization permissions, data.all may allow an external actor with an authenticated account to perform restricted operations against DataSets and Environments.

  • EPSS 0.11%
  • Veröffentlicht 09.11.2024 01:15:03
  • Zuletzt bearbeitet 14.10.2025 19:15:36

An authenticated data.all user is able to perform mutating UPDATE operations on persisted Notification records in data.all for group notifications that their user is not a member of.