CVE-2024-52314

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*

History

19 Sep 2025, 14:18

Type Values Removed Values Added
References () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - () https://aws.amazon.com/security/security-bulletins/AWS-2024-013 - Vendor Advisory
References () https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h - () https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h - Vendor Advisory
First Time Amazon
Amazon data.all
CPE cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*

12 Nov 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) Un miembro del equipo de administración de data.all que tenga acceso a la cuenta de AWS propiedad del cliente donde se implementa data.all puede extraer datos de usuario de los registros de la aplicación data.all en data.all a través del escaneo de registros de CloudWatch para operaciones particulares que interactúan con los datos de los equipos productores del cliente.

09 Nov 2024, 02:15

Type Values Removed Values Added
References
  • () https://github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6h -

09 Nov 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-09 01:15

Updated : 2025-09-19 14:18


NVD link : CVE-2024-52314

Mitre link : CVE-2024-52314

CVE.ORG link : CVE-2024-52314


JSON object : View

Products Affected

amazon

  • data.all
CWE
CWE-863

Incorrect Authorization