Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-0745 : What You Need to Know

Learn about CVE-2023-0745 affecting YugabyteDB Anywhere, allowing arbitrary file writing through backup upload endpoint via path traversal characters. Published on February 9, 2023.

This CVE, assigned by Yugabyte, was published on February 9, 2023. It involves an issue in YugabyteDB Anywhere that allows for arbitrary file writing through the backup upload endpoint by exploiting path traversal characters.

Understanding CVE-2023-0745

This vulnerability, tracked as CVE-2023-0745, poses a risk to systems running YugabyteDB Anywhere versions 2.0 to 2.13. It is associated with the program file PlatformReplicationManager.Java.

What is CVE-2023-0745?

The High Availability functionality of Yugabyte Anywhere can be exploited to write arbitrary files through the backup upload endpoint by utilizing path traversal characters.

The Impact of CVE-2023-0745

The impact of this vulnerability is categorized under CAPEC-126 for Path Traversal. It has the potential to severely impact confidentiality, integrity, and availability, with a CVSS base score of 6.7 classified as medium severity.

Technical Details of CVE-2023-0745

This vulnerability, identified as a CWE-23 Relative Path Traversal issue, requires high privileges to exploit and has a low attack complexity. The attack vector is local with a high impact on availability, confidentiality, and integrity.

Vulnerability Description

The flaw allows attackers to abuse the High Availability feature to write arbitrary files via the backup upload endpoint using path traversal characters.

Affected Systems and Versions

YugabyteDB Anywhere versions 2.0.0.0 through 2.13.0.0 are susceptible to this vulnerability.

Exploitation Mechanism

Exploiting this vulnerability involves leveraging path traversal characters within the backup upload endpoint to write arbitrary files.

Mitigation and Prevention

To mitigate the risks associated with CVE-2023-0745, users and administrators should take immediate steps to enhance security and apply long-term practices to prevent similar vulnerabilities in the future.

Immediate Steps to Take

Users are advised to update their systems to version 2.14 onwards, as this fix addresses the arbitrary file writing vulnerability.

Long-Term Security Practices

Employ security best practices such as regular security assessments, access control measures, and ongoing monitoring to safeguard against potential exploits.

Patching and Updates

Regularly applying security patches and updates provided by Yugabyte helps in addressing known vulnerabilities and enhancing the overall security posture of the system.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now