Lucene search

K
githubGitHub Advisory DatabaseGHSA-735R-HV67-G38F
HistoryApr 11, 2023 - 9:12 p.m.

vitess allows users to create keyspaces that can deny access to already existing keyspaces

2023-04-1121:12:42
CWE-20
CWE-703
GitHub Advisory Database
github.com
7
vitess
deny access
keyspaces
cli
security audit
cncf
ostif

4.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

0.001 Low

EPSS

Percentile

35.3%

Impact

Users can either intentionally or inadvertently create a keyspace containing / characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using vtctldclient GetKeyspaces will also return an error.
Note that all other keyspaces can still be administered using the CLI (vtctldclient).

Patches

v16.0.1 (corresponding to 0.16.1 on pkg.go.dev)

Workarounds

Delete the offending keyspace using a CLI client (vtctldclient)

vtctldclient --server ... DeleteKeyspace a/b

Found during a security audit sponsored by the CNCF and facilitated by OSTIF.

Affected configurations

Vulners
Node
vitess.iovitessRange<0.16.1
CPENameOperatorVersion
vitess.io/vitesslt0.16.1

4.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

0.001 Low

EPSS

Percentile

35.3%