Amazon

Data.All

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 09.11.2024 01:15:05
  • Last modified 19.09.2025 14:18:22

An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in da...

  • EPSS 0.11%
  • Published 09.11.2024 01:15:05
  • Last modified 19.09.2025 14:18:08

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact w...

  • EPSS 0.21%
  • Published 09.11.2024 01:15:04
  • Last modified 19.09.2025 14:17:49

Authentication tokens issued via Cognito in data.all are not invalidated on log out, allowing for previously authenticated user to continue execution of authorized API Requests until token is expired.

  • EPSS 0.12%
  • Published 09.11.2024 01:15:04
  • Last modified 19.09.2025 14:18:35

Due to inconsistent authorization permissions, data.all may allow an external actor with an authenticated account to perform restricted operations against DataSets and Environments.

  • EPSS 0.09%
  • Published 09.11.2024 01:15:03
  • Last modified 19.09.2025 14:17:10

An authenticated data.all user is able to perform mutating UPDATE operations on persisted Notification records in data.all for group notifications that their user is not a member of.