First published: Tue Nov 09 2021(Updated: )
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | >=8.0.0<8.18.13 | |
Mendix | >=9.0.0<9.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42026 is a vulnerability identified in Mendix Applications using Mendix 8 (All versions < V8.18.13) and Mendix Applications using Mendix 9 (All versions < V9.6.2).
CVE-2021-42026 allows unauthorized users to gain read access to certain client actions in Mendix Applications.
CVE-2021-42026 has a severity rating of 4.3, which is considered medium.
To fix CVE-2021-42026, you should update your Mendix Applications to versions V8.18.13 or V9.6.2 or newer.
You can find more information about CVE-2021-42026 in the reference document at https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf.