Learn about CVE-2023-0745 affecting YugabyteDB Anywhere, allowing arbitrary file writing through backup upload endpoint via path traversal characters. Published on February 9, 2023.
This CVE, assigned by Yugabyte, was published on February 9, 2023. It involves an issue in YugabyteDB Anywhere that allows for arbitrary file writing through the backup upload endpoint by exploiting path traversal characters.
Understanding CVE-2023-0745
This vulnerability, tracked as CVE-2023-0745, poses a risk to systems running YugabyteDB Anywhere versions 2.0 to 2.13. It is associated with the program file PlatformReplicationManager.Java.
What is CVE-2023-0745?
The High Availability functionality of Yugabyte Anywhere can be exploited to write arbitrary files through the backup upload endpoint by utilizing path traversal characters.
The Impact of CVE-2023-0745
The impact of this vulnerability is categorized under CAPEC-126 for Path Traversal. It has the potential to severely impact confidentiality, integrity, and availability, with a CVSS base score of 6.7 classified as medium severity.
Technical Details of CVE-2023-0745
This vulnerability, identified as a CWE-23 Relative Path Traversal issue, requires high privileges to exploit and has a low attack complexity. The attack vector is local with a high impact on availability, confidentiality, and integrity.
Vulnerability Description
The flaw allows attackers to abuse the High Availability feature to write arbitrary files via the backup upload endpoint using path traversal characters.
Affected Systems and Versions
YugabyteDB Anywhere versions 2.0.0.0 through 2.13.0.0 are susceptible to this vulnerability.
Exploitation Mechanism
Exploiting this vulnerability involves leveraging path traversal characters within the backup upload endpoint to write arbitrary files.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-0745, users and administrators should take immediate steps to enhance security and apply long-term practices to prevent similar vulnerabilities in the future.
Immediate Steps to Take
Users are advised to update their systems to version 2.14 onwards, as this fix addresses the arbitrary file writing vulnerability.
Long-Term Security Practices
Employ security best practices such as regular security assessments, access control measures, and ongoing monitoring to safeguard against potential exploits.
Patching and Updates
Regularly applying security patches and updates provided by Yugabyte helps in addressing known vulnerabilities and enhancing the overall security posture of the system.