Headline
CVE-2023-23835
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.34), Mendix Applications using Mendix 8 (All versions < V8.18.23), Mendix Applications using Mendix 9 (All versions < V9.22.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.10), Mendix Applications using Mendix 9 (V9.18) (All versions < V9.18.4), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.15). Some of the Mendix runtime API’s allow attackers to bypass XPath constraints and retrieve information using XPath queries that trigger errors.
%PDF-1.5 %���� 56 0 obj << /Length 2162 /Filter /FlateDecode >> stream xڵZIw�H��WpD�s_���]۫��*�%{f^UTۼ�����?�2H�lP�D��ED���G/~�_\~�*2�H*��}�0�RF�$�����[<��u��M�T�x�&�b2%"�ʿ����g��a��8����}���"_����� ̞O~��z�~~���pD�H1%�o��h �~�0bFG����gp��f���A��ڠi�SB"�iM͑Q�@��G �W�� a�:(hv5��j�ߜ D�@��Y\ ��a�:��}H00�6]���)����5�c�� ��>�sĄj�b��}H�v)�]�S�����|�+�E�)O��"�� �D�̀���h�#���H�W��X��VW’R0�ό"���!A(ҪӍ,1AXS�l�¸H�A�g �Z����N�|-�����t���{�:� c���A\�2̠��uKK�#�o�l�:��Qh�2���*���_�]�^eɢ����e�¹�4�)�S��@wJ2������ҿs�]���"乷D��(�Mx�n�q�;X��D��� ����l�_� A����إ!�$yaPR����bU!%A�;��-�����ק4 \ħ��ϟ�n&�����d��’9C�m�ONh�/��� ;?���[x��z[�۴�I��jӋ|��t�ebb\&�&f&I\>.�j�~�dV�|����Z��\$�S�3!&��,sg���-�Q1�K’����]( �p�j���E� �!��a�b��7EZ�Z#� �焊8X;���![v����]�yh]�}Z�+y������α#iQ����ygDF �$AΧ*G��q�n�J�A�~x�0��ij?����,��x���K[_1�^50\�I���������\�������p�$d+`�MY//�e=# �Rs��������Z� U��2�!*ۊ&F!���x��b��y�����u���n��gmu�z�F�@݃�P7�N��T��_ZtO)T����9v�8�B�.�-1.T�����n矾~i�Ygi$ IjțGK(����H�#р(8�j�v���h�j�G�?���McgC&�����n9HE�H������qmӧG��f4�"��U r[7��.��;�� lB���ԧ�B��W�5&�*�a��75r~��Ds"�/UP��/��q����i��r(܉yA �e���m~M�E�+��ն�r�(t��w}��k� T�?� O?� �)�(�5��jJ�z�s#ޫ@��F ��c��N�Ʀr�J?������>�ۂ�bэ��Fm6/�PM8��c��2�BI��ԋ���;Wq��� �P� ʱ/ZŻ��ZU{ �}��4�e�ݽ��\扯2�Ϊ���Pmr(J.w�~���V��H����ХU������x��N��hǰA`JÂ��G�#�64�`ԯ F��6:��*i�A?ς�b��ȹv�29���1����50Zu����:�H�`H��`��=���a��X�����KL7GPH����b��jq�� z�’�c� ��e2M�K�x8d��UZ��C{nW�V84=@x��N��8h�;�����4���(�6 �!���X`pI W��@D���T��ȕ�:P��{ T��f