Information Exposure Affecting io.apiman:apiman-manager-api-rest-impl package, versions [0,3.1.1.Final)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-IOAPIMAN-5291387
  • published28 Mar 2023
  • disclosed27 Mar 2023
  • creditvolkflo, bastiangem

Introduced: 27 Mar 2023

CVE-2023-28640  (opens in a new tab)
CWE-269  (opens in a new tab)
CWE-280  (opens in a new tab)

How to fix?

Upgrade io.apiman:apiman-manager-api-rest-impl to version 3.1.1.Final or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure due to a missing permissions check, which allows attackers with an authenticated Apiman Manager account to gain access to API keys they do not have permission for, if they correctly guess the URL. The URL includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource, and each of these can have arbitrary values. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names.

Note: This issue does not affect the Apiman Gateway.

Workaround

Users should only provide Apiman Manager accounts to known users and not allow anonymous/unknown users to create an Apiman Manager account.

CVSS Scores

version 3.1