Vitess is a database clustering system for horizontal scaling of MySQL through generalized sharding. Prior to version 16.0.2, users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will receive an error. Attempting to view the keyspace(s) will also no longer work. Creating a shard using `vtctldclient` does not have the same problem because the CLI validates the input correctly. Version 16.0.2, corresponding to version 0.16.2 of the `go` module, contains a patch for this issue. Some workarounds are available. Always use `vtctldclient` to create shards, instead of using VTAdmin; disable creating shards from VTAdmin using RBAC; and/or delete the topology record for the offending shard using the client for your topology server.
References
Link | Resource |
---|---|
https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920 | Patch |
https://github.com/vitessio/vitess/issues/12842 | Exploit Issue Tracking Patch |
https://github.com/vitessio/vitess/pull/12843 | Issue Tracking Patch |
https://github.com/vitessio/vitess/releases/tag/v16.0.2 | Release Notes |
https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w | Mitigation Vendor Advisory |
https://pkg.go.dev/vitess.io/vitess@v0.16.2 | Product |
https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920 | Patch |
https://github.com/vitessio/vitess/issues/12842 | Exploit Issue Tracking Patch |
https://github.com/vitessio/vitess/pull/12843 | Issue Tracking Patch |
https://github.com/vitessio/vitess/releases/tag/v16.0.2 | Release Notes |
https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w | Mitigation Vendor Advisory |
https://pkg.go.dev/vitess.io/vitess@v0.16.2 | Product |
Configurations
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.1 |
References | () https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920 - Patch | |
References | () https://github.com/vitessio/vitess/issues/12842 - Exploit, Issue Tracking, Patch | |
References | () https://github.com/vitessio/vitess/pull/12843 - Issue Tracking, Patch | |
References | () https://github.com/vitessio/vitess/releases/tag/v16.0.2 - Release Notes | |
References | () https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w - Mitigation, Vendor Advisory | |
References | () https://pkg.go.dev/vitess.io/vitess@v0.16.2 - Product |
Information
Published : 2023-05-11 20:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29195
Mitre link : CVE-2023-29195
CVE.ORG link : CVE-2023-29195
JSON object : View
Products Affected
linuxfoundation
- vitess
CWE
CWE-20
Improper Input Validation
CWE-703Improper Check or Handling of Exceptional Conditions
NVD-CWE-noinfo