An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-45842 An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Fixes

Solution

A fix for this issue is available in data.all version 2.6.1 and later. Customers are advised to upgrade to version 2.6.1 or later.


Workaround

No workaround given by the vendor.

History

Wed, 15 Oct 2025 05:30:00 +0900

Type Values Removed Values Added
Weaknesses CWE-863

Wed, 15 Oct 2025 04:45:00 +0900

Type Values Removed Values Added
Weaknesses CWE-639

Wed, 15 Oct 2025 04:15:00 +0900

Type Values Removed Values Added
References

Fri, 19 Sep 2025 23:30:00 +0900

Type Values Removed Values Added
First Time appeared Amazon
Amazon data.all
CPEs cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*
Vendors & Products Amazon
Amazon data.all

Tue, 15 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00052}

epss

{'score': 0.00056}


Wed, 13 Nov 2024 17:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 09 Nov 2024 10:30:00 +0900


Sat, 09 Nov 2024 10:00:00 +0900

Type Values Removed Values Added
Description An authenticated data.all user is able to manipulate a getDataset query to fetch additional information regarding the parent Environment resource that the user otherwise would not able to fetch by directly querying the object via getEnvironment in data.all.
Title data.all authenticated users can obtain incorrect object level authorizations
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2025-10-14T19:26:56.176Z

Reserved: 2024-11-06T21:02:34.355Z

Link: CVE-2024-52313

cve-icon Vulnrichment

Updated: 2024-11-12T15:14:27.447Z

cve-icon NVD

Status : Modified

Published: 2024-11-09T01:15:05.363

Modified: 2025-10-14T20:15:32.973

Link: CVE-2024-52313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses