First published: Tue Sep 10 2024(Updated: )
A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.17.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.11 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.19 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions < V8.18.33 only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.31 only if the basic authentication mechanism is used by the application). The authentication mechanism of affected applications contains an observable response discrepancy vulnerability when validating usernames. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix Runtime | <10.17.0 | |
Mendix Runtime V10 | <10.12.11 | |
Mendix Runtime V10 | <10.6.19 | |
Mendix | <8.18.33 | |
Mendix Runtime | <9.24.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49069 has been classified as a high severity vulnerability.
To mitigate CVE-2023-49069, upgrade to Mendix Runtime V10.17.0 or later, V10.12.11 or later, or V10.6.19 or later.
CVE-2023-49069 affects Mendix Runtime V10 (all versions below 10.17.0), V10.12 (all versions below 10.12.11), and V10.6 (all versions below 10.6.19).
CVE-2023-49069 is specifically related to applications using the basic authentication mechanism.
Currently, the only effective workaround for CVE-2023-49069 is to upgrade to a patched version of Mendix Runtime.