First published: Thu Feb 09 2023(Updated: )
The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary files through the backup upload endpoint by using path traversal characters. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0
Credit: security@yugabyte.com security@yugabyte.com
Affected Software | Affected Version | How to fix |
---|---|---|
YugabyteDB Managed | >=2.0<=2.13 |
Fixed in version 2.14 onwards .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this YugaByte vulnerability is CVE-2023-0745.
CVE-2023-0745 has a severity rating of 9.8 (Critical).
The affected software for CVE-2023-0745 is Yugabyte Managed version 2.0 through 2.13.
The CWE associated with CVE-2023-0745 are CWE-22 and CWE-23.
Yes, fixing CVE-2023-0745 requires updating the affected Yugabyte Managed software to a version that addresses the vulnerability.