This issue affects Yugabyte DB: Lesser then 2.2.0.0
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12615 | External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py. This issue affects Yugabyte DB: Lesser then 2.2.0.0 |
Solution
Use Yugabyte version 2.3.3.0-b106 or higher.
Workaround
In yugaware/config/configs folder there is a file acceptableKeys.yaml which contains a list of acceptable keys for different types of providers. Edit it and restart the Yugaware process to reload the list.
| Link | Providers |
|---|---|
| https://www.yugabyte.com/ |
|
Mon, 24 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Yugabyte
Published:
Updated: 2025-03-24T18:34:16.202Z
Reserved: 2023-01-30T08:16:20.523Z
Link: CVE-2023-0575
Updated: 2024-08-02T05:17:49.883Z
Status : Modified
Published: 2023-02-09T17:15:15.730
Modified: 2024-11-21T07:37:25.707
Link: CVE-2023-0575
No data.
OpenCVE Enrichment
No data.
EUVD