External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py.

This issue affects Yugabyte DB: Lesser then 2.2.0.0

Subscriptions

Vendors Products
Iphone Os Subscribe
Linux Kernel Subscribe
Microsoft Subscribe
Windows Subscribe
Yugabyte Subscribe
Yugabytedb Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-12615 External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py. This issue affects Yugabyte DB: Lesser then 2.2.0.0
Fixes

Solution

Use Yugabyte version 2.3.3.0-b106 or higher.


Workaround

In yugaware/config/configs folder there is a file acceptableKeys.yaml which contains a list of acceptable keys for different types of providers. Edit it and restart the Yugaware process to reload the list.

References
Link Providers
https://www.yugabyte.com/ cve-icon cve-icon
History

Mon, 24 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Yugabyte

Published:

Updated: 2025-03-24T18:34:16.202Z

Reserved: 2023-01-30T08:16:20.523Z

Link: CVE-2023-0575

cve-icon Vulnrichment

Updated: 2024-08-02T05:17:49.883Z

cve-icon NVD

Status : Modified

Published: 2023-02-09T17:15:15.730

Modified: 2024-11-21T07:37:25.707

Link: CVE-2023-0575

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.