io.apiman:apiman-manager-api-rest-impl@1.1.2.Preview2 vulnerabilities

  • latest version

    3.1.3.Final

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the io.apiman:apiman-manager-api-rest-impl package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure due to a missing permissions check, which allows attackers with an authenticated Apiman Manager account to gain access to API keys they do not have permission for, if they correctly guess the URL. The URL includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource, and each of these can have arbitrary values. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names.

    Note: This issue does not affect the Apiman Gateway.

    How to fix Information Exposure?

    Upgrade io.apiman:apiman-manager-api-rest-impl to version 3.1.1.Final or higher.

    [0,3.1.1.Final)