Valtimo backend libraries allows objects in the object-api to be accessed and modified by unauthorized users
High severity
GitHub Reviewed
Published
May 27, 2025
in
valtimo-platform/valtimo-backend-libraries
•
Updated May 30, 2025
Description
Published to the GitHub Advisory Database
May 28, 2025
Reviewed
May 28, 2025
Published by the National Vulnerability Database
May 30, 2025
Last updated
May 30, 2025
Impact
All objects for which an object-management configuration exists can be listed, viewed, edited, created or deleted by unauthorised users.
If object-urls are exposed via other channels, the contents of these objects can be viewed independent of object-management configurations.
Attack requirements
The following conditions have to be met in order to perform this attack:
showInDataMenu
is irrelevant for this attackPatches
No patch is available yet
Workarounds
It is possible to override the endpoint security as defined in
ObjectenApiHttpSecurityConfigurer
andObjectManagementHttpSecurityConfigurer
. Depending on the implementation, this could result in loss of functionality.References