Vulnerability Description
Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-6322?
CVE-2024-6322 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as th...
How severe is CVE-2024-6322?
CVE-2024-6322 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6322?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.