Lucene search

K
cve[email protected]CVE-2023-0575
HistoryFeb 09, 2023 - 5:15 p.m.

CVE-2023-0575

2023-02-0917:15:15
CWE-642
CWE-94
web.nvd.nist.gov
21
yugabyte
db
cve-2023-0575
code injection
api manipulation
privilege abuse
windows
linux
macos
ios
security vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.7%

External Control of Critical State Data, Improper Control of Generation of Code (β€˜Code Injection’) vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py.

This issue affects Yugabyte DB: Lesser then 2.2.0.0

Affected configurations

NVD
Node
yugabyteyugabytedbRange<2.2.0.0
AND
appleiphone_osMatch-
OR
applemacosMatch-
OR
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "DevopsBase.java:execCommand",
      "TableManager.java:runCommand"
    ],
    "platforms": [
      "Linux",
      "Docker",
      "Kubernetes",
      "MacOS"
    ],
    "product": "YugabyteDB",
    "vendor": "YugabyteDB",
    "versions": [
      {
        "lessThan": "2.15",
        "status": "affected",
        "version": "2.0",
        "versionType": "2.0 to 2.14"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.7%

Related for CVE-2023-0575