First published: Tue Nov 09 2021(Updated: )
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.26), Mendix Applications using Mendix 8 (All versions < V8.18.12), Mendix Applications using Mendix 9 (All versions < V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | <7.23.26 | |
Mendix | >=8.0.0<8.18.12 | |
Mendix | >=9.0.0<9.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-42015 is medium with a CVSS score of 5.5.
Mendix Applications using Mendix 7 (All versions < V7.23.26), Mendix Applications using Mendix 8 (All versions < V8.18.12), Mendix Applications using Mendix 9 (All versions < V9.6.1) are affected by CVE-2021-42015.
To fix the CVE-2021-42015 vulnerability, update your Mendix Applications to versions V7.23.26 or higher for Mendix 7, V8.18.12 or higher for Mendix 8, or V9.6.1 or higher for Mendix 9.
The CWE ID for CVE-2021-42015 is 525.
You can find more information about CVE-2021-42015 in the reference provided: https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf