Unrated severityNVD Advisory· Published Nov 9, 2024· Updated Oct 14, 2025
data.all admin user may access potentially sensitive data stored by producers via logs
CVE-2024-52314
Description
A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Affected products
2- amazon/data.allv5Range: 1.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/data-dot-all/dataall/releases/tag/v2.6.1mitrepatch
- aws.amazon.com/security/security-bulletins/AWS-2024-013mitrevendor-advisory
- github.com/data-dot-all/dataall/security/advisories/GHSA-p2h8-r28g-5q6hmitrethird-party-advisory
News mentions
0No linked articles in our index yet.