CVE-2023-49112

6.5 MEDIUM
Published: June 20, 2024 Modified: November 04, 2025

Description

Kiuwan provides an API endpoint /saas/rest/v1/info/application to get information about any application, providing only its name via the "application" parameter. This endpoint lacks proper access control mechanisms, allowing other authenticated users to read information about applications, even though they have not been granted the necessary rights to do so. This issue affects Kiuwan SAST: <master.1808.p685.q13371

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://r.sec-consult.com/kiuwan
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
http://seclists.org/fulldisclosure/2024/Jun/3
Source: af854a3a-2127-422b-91ae-364da2661108
https://r.sec-consult.com/kiuwan
Source: af854a3a-2127-422b-91ae-364da2661108

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
0.1%
33th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)