Release Date

29th November 2021.

Overview

It was possible to retrieve documentation for the VMS API as an unauthenticated user. It could be used by an attacker to determine the methods exposed by the API and how to create a well-formed request.

Affected Products

  • Ava Aware:
    • All Stable upgrade channel versions before 4.3.4.
    • All Beta upgrade channel versions before 4.3.1

Unaffected Products

  • Ava Aware:
    • All Stable upgrade channel versions after and including 4.3.4.
    • All Beta upgrade channel versions after and including 4.3.1

Resolution

This issue has been fixed in Ava Aware Beta upgrade channel version 4.3.1 and Stable upgrade channel version 4.3.4.

It is strongly recommended that all installations running an affected version are upgraded to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface.

Vulnerability Information

Mitigations

There are no known mitigations for this issue.

Work arounds

There are no known work arounds for this issue.

Acknowledgements

Issue found, and report to Ava Security, during an external pentest.

Disclosure Timeline

  • 02/06/2021 Issue found by an external pentest
  • 13/09/2021 Fix identified
  • 19/10/2021 Patched Ava Aware (Beta upgrade channel) released
  • 18/11/2021 Patched Ava Aware (Stable upgrade channel) released
  • 30/11/2021 Vulnerability publicly disclosed