Miggo Logo

CVE-2023-28640: Apiman vulnerable to permissions bypass due to missing check on API key URL

6.4

CVSS Score
3.1

Basic Information

EPSS Score
0.32264%
Published
3/27/2023
Updated
4/3/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.apiman:apiman-manager-api-rest-implmaven< 3.0.0.Final3.1.0.Final

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing authorization checks when accessing API keys via a URL containing organization/client/version parameters. In REST API implementations like Apiman, endpoint handlers (e.g., ClientResourceImpl) would typically enforce permissions before returning sensitive data like API keys. The function handling GET requests for API keys (getApiKey) likely lacked these checks in vulnerable versions, allowing unauthorized access if attackers guessed valid URL parameters. This matches the CWE-862 (Missing Authorization) description and the vulnerability's URL-based exploitation pattern.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *u* to * missin* p*rmissions ****k, *n *tt**k*r wit* *n *ut**nti**t** *pim*n M*n***r ***ount m*y ** **l* to **in ****ss to *PI k*ys t**y *o not **v* p*rmission *or i* t**y *orr**tly *u*ss t** URL. T** URL in*lu**s Or**nis*tion I*, *li*nt

Reasoning

T** vuln*r**ility st*ms *rom missin* *ut*oriz*tion ****ks w**n ****ssin* *PI k*ys vi* * URL *ont*inin* or**niz*tion/*li*nt/v*rsion p*r*m*t*rs. In R*ST *PI impl*m*nt*tions lik* *pim*n, *n*point **n*l*rs (*.*., `*li*ntR*sour**Impl`) woul* typi**lly *n*