A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.
History

Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 07:00:00 +0000

Type Values Removed Values Added
Description A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.
Title Improper Access Control in Delphix Masking Engine
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Perforce

Published: 2025-04-17T06:41:47.667Z

Updated: 2025-04-17T19:00:48.208Z

Reserved: 2025-04-02T10:24:35.710Z

Link: CVE-2025-3113

cve-icon Vulnrichment

Updated: 2025-04-17T18:52:53.347Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-17T07:15:43.790

Modified: 2025-04-17T20:21:48.243

Link: CVE-2025-3113

cve-icon Redhat

No data.