Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39424 | Retool (self-hosted enterprise) through 3.40.0 inserts resource authentication credentials into sent data. Credentials for users with "Use" permissions can be discovered (by an authenticated attacker) via the /api/resources endpoint. The earliest affected version is 3.18.1. |
Thu, 13 Mar 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-352 |
Mon, 26 Aug 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Retool
Retool retool |
|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:retool:retool:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Retool
Retool retool |
|
| Metrics |
cvssV3_1
|
Thu, 22 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Aug 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Retool (self-hosted enterprise) through 3.40.0 inserts resource authentication credentials into sent data. Credentials for users with "Use" permissions can be discovered (by an authenticated attacker) via the /api/resources endpoint. The earliest affected version is 3.18.1. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-02T18:30:48.105Z
Reserved: 2024-07-28T00:00:00.000Z
Link: CVE-2024-42056
Updated: 2024-08-22T19:57:22.552Z
Status : Modified
Published: 2024-08-22T01:15:03.460
Modified: 2025-03-13T18:15:43.603
Link: CVE-2024-42056
No data.
OpenCVE Enrichment
No data.
EUVD