Description
Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0.0.0 through 2.13.0.0

Published: 2023-02-09
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Fixed in version 2.14 onwards . 

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-12614 Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0.0.0 through 2.13.0.0
References
Link Providers
https://www.yugabyte.com/ cve-icon cve-icon
History

Mon, 24 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Yugabyte Yugabytedb Managed
cve-icon MITRE

Status: PUBLISHED

Assigner: Yugabyte

Published:

Updated: 2025-03-24T18:33:02.110Z

Reserved: 2023-01-30T08:15:55.659Z

Link: CVE-2023-0574

cve-icon Vulnrichment

Updated: 2024-08-02T05:17:49.846Z

cve-icon NVD

Status : Modified

Published: 2023-02-09T15:15:11.213

Modified: 2024-11-21T07:37:25.603

Link: CVE-2023-0574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.