CVE-2023-29195

Vitess is a database clustering system for horizontal scaling of MySQL through generalized sharding. Prior to version 16.0.2, users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will receive an error. Attempting to view the keyspace(s) will also no longer work. Creating a shard using `vtctldclient` does not have the same problem because the CLI validates the input correctly. Version 16.0.2, corresponding to version 0.16.2 of the `go` module, contains a patch for this issue. Some workarounds are available. Always use `vtctldclient` to create shards, instead of using VTAdmin; disable creating shards from VTAdmin using RBAC; and/or delete the topology record for the offending shard using the client for your topology server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:vitess:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 4.1
References () https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920 - Patch () https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920 - Patch
References () https://github.com/vitessio/vitess/issues/12842 - Exploit, Issue Tracking, Patch () https://github.com/vitessio/vitess/issues/12842 - Exploit, Issue Tracking, Patch
References () https://github.com/vitessio/vitess/pull/12843 - Issue Tracking, Patch () https://github.com/vitessio/vitess/pull/12843 - Issue Tracking, Patch
References () https://github.com/vitessio/vitess/releases/tag/v16.0.2 - Release Notes () https://github.com/vitessio/vitess/releases/tag/v16.0.2 - Release Notes
References () https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w - Mitigation, Vendor Advisory () https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w - Mitigation, Vendor Advisory
References () https://pkg.go.dev/vitess.io/vitess@v0.16.2 - Product () https://pkg.go.dev/vitess.io/vitess@v0.16.2 - Product

Information

Published : 2023-05-11 20:15

Updated : 2024-11-21 07:56


NVD link : CVE-2023-29195

Mitre link : CVE-2023-29195

CVE.ORG link : CVE-2023-29195


JSON object : View

Products Affected

linuxfoundation

  • vitess
CWE
CWE-20

Improper Input Validation

CWE-703

Improper Check or Handling of Exceptional Conditions

NVD-CWE-noinfo