A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://portal.perforce.com/s/detail/a91PA000001SeefYAC |
|
History
Thu, 17 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Apr 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets. | |
| Title | Improper Access Control in Delphix Masking Engine | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Perforce
Published: 2025-04-17T06:41:47.667Z
Updated: 2025-04-17T19:00:48.208Z
Reserved: 2025-04-02T10:24:35.710Z
Link: CVE-2025-3113
Updated: 2025-04-17T18:52:53.347Z
Status : Awaiting Analysis
Published: 2025-04-17T07:15:43.790
Modified: 2025-04-17T20:21:48.243
Link: CVE-2025-3113
No data.
ReportizFlow