Even a well-built Mendix application can become vulnerable if the entity access rules are not properly configured. TSU-02 highlights the risks of insecure access definitions and provides practical steps to protect your data.
Mendix uses Role Based Access Control (RBAC) to define what each user can access and modify in an application. Within this system, User Roles are linked to module roles, and these module roles contain entity access rules that determine how data can be read, created, updated, or deleted.
When a module role is configured insecurely, users may gain broader access to data than intended. This can expose or even alter sensitive information, often leading to a data breach.
TSU-01 and TSU-02 are often confused. Both deal with users having too much access, but understanding the difference helps you prevent risks more effectively.
To prevent TSU-02 vulnerabilities, configure entity access rules carefully and grant only the permissions necessary for your application to function. Follow these best practices:
The following vulnerabilities are common in insecure Entity Access configurations and illustrate where things can go wrong in practice.
TSU-02 focuses on insecure entity access configuration, a common but critical issue in Mendix apps. Properly defining entity access rules and applying strict XPath constraints ensures that users only interact with the data they are meant to see or change.
Want to know how your Mendix application scores on The S-Unit Top 10? In collaboration with Omnext, we’ve developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are detected early and made immediately visible. For questions, feel free to contact us.