Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49112: Vulnerability in Kiuwan SAST

0
Medium
VulnerabilityCVE-2023-49112cvecve-2023-49112
Published: Thu Jun 20 2024 (06/20/2024, 12:36:18 UTC)
Source: CVE Database V5
Vendor/Project: Kiuwan
Product: SAST

Description

Kiuwan provides an API endpoint /saas/rest/v1/info/application to get information about any application, providing only its name via the "application" parameter. This endpoint lacks proper access control mechanisms, allowing other authenticated users to read information about applications, even though they have not been granted the necessary rights to do so. This issue affects Kiuwan SAST: <master.1808.p685.q13371

AI-Powered Analysis

AILast updated: 11/04/2025, 18:24:50 UTC

Technical Analysis

CVE-2023-49112 is a vulnerability identified in Kiuwan SAST, a Static Application Security Testing tool, affecting versions prior to master.1808.p685.q13371. The issue resides in the API endpoint /saas/rest/v1/info/application, which is designed to provide information about applications based on the application name parameter. However, this endpoint lacks adequate access control checks, allowing any authenticated user to query information about any application, regardless of their assigned permissions. This represents a broken access control vulnerability (CWE-639), where authorization is insufficiently enforced. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The attacker must have some level of authentication (PR:L), but no further privileges or user interaction are needed. The impact is primarily on confidentiality, as unauthorized users can access sensitive application metadata or details that should be restricted. There is no impact on integrity or availability. No known exploits are reported in the wild as of the publication date (June 20, 2024). The vulnerability is rated medium severity with a CVSS 3.1 base score of 6.5, reflecting the balance between ease of exploitation and the limited scope of impact. The lack of patch links suggests that a fix may be pending or distributed through vendor channels.

Potential Impact

For European organizations, the primary impact of CVE-2023-49112 is unauthorized disclosure of sensitive application information managed within Kiuwan SAST. This could lead to leakage of intellectual property, exposure of application architecture details, or insights that facilitate further targeted attacks such as social engineering or exploitation of other vulnerabilities. Organizations relying on Kiuwan SAST for secure software development lifecycle (SDLC) processes may find their confidentiality assurances weakened. While the vulnerability does not directly compromise system integrity or availability, the information disclosure could indirectly increase risk exposure. European companies in sectors with high software development activity, including finance, manufacturing, and technology, may be particularly concerned. Additionally, regulatory frameworks such as GDPR emphasize data confidentiality, so unauthorized data exposure could have compliance implications if personal or sensitive data is involved in the application metadata.

Mitigation Recommendations

1. Apply vendor-provided patches or updates as soon as they become available to address the access control flaw in Kiuwan SAST. 2. Until patches are applied, restrict access to the Kiuwan SAST API endpoint via network segmentation and firewall rules, limiting access only to trusted users and systems. 3. Enforce strict authentication and authorization policies within Kiuwan SAST, reviewing user roles and permissions to minimize unnecessary access. 4. Monitor API access logs for unusual or unauthorized queries to detect potential exploitation attempts. 5. Consider implementing additional application-layer access controls or API gateways that can enforce fine-grained authorization checks. 6. Educate development and security teams about the vulnerability to ensure awareness and prompt reporting of suspicious activity. 7. Review and audit all application metadata stored or accessible through Kiuwan SAST to identify and protect sensitive information that could be exposed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2023-11-22T11:08:37.654Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5cff58c9332ff08e91

Added to database: 11/4/2025, 5:43:56 PM

Last enriched: 11/4/2025, 6:24:50 PM

Last updated: 11/5/2025, 2:10:01 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats