CVE-2023-28640: Apiman vulnerable to permissions bypass due to missing check on API key URL
6.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32264%
CWE
Published
3/27/2023
Updated
4/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.apiman:apiman-manager-api-rest-impl | maven | < 3.0.0.Final | 3.1.0.Final |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks when accessing API keys via a URL containing organization/client/version parameters. In REST API implementations like Apiman, endpoint handlers (e.g., ClientResourceImpl) would typically enforce permissions before returning sensitive data like API keys. The function handling GET requests for API keys (getApiKey) likely lacked these checks in vulnerable versions, allowing unauthorized access if attackers guessed valid URL parameters. This matches the CWE-862 (Missing Authorization) description and the vulnerability's URL-based exploitation pattern.