Zowe Api Mediation Layer Linux Foundation Zowe Api Mediation Layer

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Linux Foundation Zowe Api Mediation Layer.

By the Year

In 2026 there have been 0 vulnerabilities in Linux Foundation Zowe Api Mediation Layer. Zowe Api Mediation Layer did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 2 5.30
2023 1 5.30

It may take a day or so for new Zowe Api Mediation Layer vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Linux Foundation Zowe Api Mediation Layer Security Vulnerabilities

Public Conformance Validation Endpoint Exposes Service Details (CVE-2024-9802)
CVE-2024-9802 5.3 - Medium - October 10, 2024

The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running.

Cleartext Storage of Sensitive Information

Spring Boot Actuator Public Health Endpoint Leak
CVE-2024-9798 5.3 - Medium - October 10, 2024

The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.

Cleartext Storage of Sensitive Information

zOSMF v1.16v1.19 JWT Secret Bypass Vulnerability
CVE-2021-4314 5.3 - Medium - January 18, 2023

It is possible to manipulate the JWT token without the knowledge of the JWT secret and authenticate without valid JWT token as any user. This is happening only in the situation when zOSMF doesnt have the APAR PH12143 applied. This issue affects: 1.16 versions to 1.19. What happens is that the services using the ZAAS client or the API ML API to query will be deceived into believing the information in the JWT token is valid when it isnt. Its possible to use this to persuade the southbound service that different user is authenticated.

authentification

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Linux Foundation Zowe Api Mediation Layer or by Linux Foundation? Click the Watch button to subscribe.

subscribe