CVE-2022-47551

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-47551
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47551.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-47551
Aliases
Published
2022-12-20T00:15:10Z
Modified
2024-09-03T04:21:20.460749Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.

References

Affected packages

Git / github.com/apiman/apiman

Affected ranges

Type
GIT
Repo
https://github.com/apiman/apiman
Events

Affected versions

2.*

2.0.0.Final
2.1.0.Final
2.1.1.Final
2.1.2.Final
2.1.3.Final
2.1.4.Final
2.1.5.Final
2.2.0.Final
2.2.1.Final
2.2.2.Final
2.2.3.Final

apiman-1.*

apiman-1.5.7.Final