A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
References
Link | Resource |
---|---|
https://aws.amazon.com/security/security-bulletins/AWS-2024-013 | Vendor Advisory |
https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h | Vendor Advisory |
Configurations
History
19 Sep 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - Vendor Advisory | |
References | () https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h - Vendor Advisory | |
First Time |
Amazon
Amazon data.all |
|
CPE | cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:* |
12 Nov 2024, 13:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Nov 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-09 01:15
Updated : 2025-09-19 14:18
NVD link : CVE-2024-52314
Mitre link : CVE-2024-52314
CVE.ORG link : CVE-2024-52314
JSON object : View
Products Affected
amazon
- data.all
CWE
CWE-863
Incorrect Authorization