
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2022-32170) affects Bytebase versions 0.1.0 through 1.0.4. It is an improper authorization vulnerability where the application fails to restrict low privilege users from accessing admin projects. The vulnerability was disclosed on September 28, 2022 (NIST NVD).
The vulnerability exists in the endpoint '/api/project?user=${userId}' where the application does not properly validate user access permissions. This allows unauthorized users to view projects created by administrators by manipulating the userId parameter in API requests. The vulnerability has a CVSS v3.1 base score of 4.3 and is classified as CWE-285 (Improper Authorization) (Mend VulnDB).
When exploited, this vulnerability allows low-privileged users to view projects created by administrators, leading to unauthorized access to potentially sensitive project information. The impact is primarily on confidentiality, with no direct effect on system integrity or availability (Mend VulnDB).
At the time of disclosure, no official fix was available for this vulnerability. Organizations using affected versions of Bytebase (0.1.0 through 1.0.4) should implement additional access controls and monitor for unauthorized access attempts (Mend VulnDB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."