Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-4640", "assignerOrgId": "d4ae51d3-4db5-465e-bc8a-eb6768324078", "state": "PUBLISHED", "assignerShortName": "Yugabyte", "dateReserved": "2023-08-30T16:41:56.711Z", "datePublished": "2023-08-30T16:42:45.242Z", "dateUpdated": "2024-10-01T18:31:56.957Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Anywhere", "repo": "https://github.com/yugabyte/yugabyte-db", "vendor": "YugabyteDB", "versions": [{"lessThanOrEqual": "2.17.3", "status": "affected", "version": "2.0.0", "versionType": "2.17.3.0"}]}], "datePublic": "2023-08-30T16:42:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(252, 252, 252);\">The controller responsible for setting the logging level does not include any authorization\nchecks to ensure the user is authenticated. This can be seen by noting that it extends\n</span><span style=\"background-color: rgb(246, 246, 246);\">Controller </span><span style=\"background-color: rgb(252, 252, 252);\">rather than </span><span style=\"background-color: rgb(246, 246, 246);\">AuthenticatedController </span><span style=\"background-color: rgb(252, 252, 252);\">and includes no further checks. </span><span style=\"background-color: rgb(252, 252, 252);\">This issue affects YugabyteDB Anywhere: from 2.0.0 through 2.17.3</span><br>"}], "value": "The controller responsible for setting the logging level does not include any authorization\nchecks to ensure the user is authenticated. This can be seen by noting that it extends\nController rather than AuthenticatedController and includes no further checks.\u00a0This issue affects YugabyteDB Anywhere: from 2.0.0 through 2.17.3\n"}], "impacts": [{"capecId": "CAPEC-115", "descriptions": [{"lang": "en", "value": "CAPEC-115 Authentication Bypass"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "d4ae51d3-4db5-465e-bc8a-eb6768324078", "shortName": "Yugabyte", "dateUpdated": "2023-08-30T16:42:45.242Z"}, "references": [{"url": "https://www.yugabyte.com/"}], "source": {"discovery": "UNKNOWN"}, "title": "Set Logging Level Without Authentication", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T07:31:06.630Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.yugabyte.com/", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-01T18:31:41.822513Z", "id": "CVE-2023-4640", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-01T18:31:56.957Z"}}]}}