The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary
files through the backup upload endpoint by using path traversal characters.
This vulnerability is associated with program files PlatformReplicationManager.Java.
This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0
References
Link | Resource |
---|---|
https://www.yugabyte.com/ | Product |
https://www.yugabyte.com/ | Product |
Configurations
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References | () https://www.yugabyte.com/ - Product |
10 Nov 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary files through the backup upload endpoint by using path traversal characters. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0 |
07 Nov 2023, 04:01
Type | Values Removed | Values Added |
---|---|---|
Summary | Relative Path Traversal vulnerability in YugaByte, Inc. Yugabyte Managed (PlatformReplicationManager.Java modules) allows Path Traversal. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects Yugabyte Managed: from 2.0 through 2.13. |
Information
Published : 2023-02-09 17:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0745
Mitre link : CVE-2023-0745
CVE.ORG link : CVE-2023-0745
JSON object : View
Products Affected
yugabyte
- yugabytedb_managed