7 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

YugabyteDB is vulnerable to cross site scripting (XSS) via log injection. Writing invalidated user input to log files can allow an unprivileged attacker to forge log entries or inject malicious content into the logs. YugabyteDB es vulnerable a Cross-Site Scripting (XSS) mediante inyección de registros. Escribir entradas de usuario invalidadas en archivos de registro puede permitir que un atacante falsifique entradas de registro o inyecte contenido malicioso en los registros. • https://www.yugabyte.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-117: Improper Output Neutralization for Logs •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Prometheus metrics are available without authentication. These expose detailed and sensitive information about the YugabyteDB Anywhere environment. Las métricas de Prometheus están disponibles sin autenticación. Estos exponen información detallada y confidencial sobre el entorno YugabyteDB Anywhere. • https://www.yugabyte.com • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The controller responsible for setting the logging level does not include any authorization checks to ensure the user is authenticated. This can be seen by noting that it extends Controller rather than AuthenticatedController and includes no further checks. This issue affects YugabyteDB Anywhere: from 2.0.0 through 2.17.3 El controlador responsable de establecer el nivel de registro no incluye ninguna comprobación de autorización para garantizar que el usuario está autenticado. Esto puede verse observando que extiende Controller en lugar de AuthenticatedController y no incluye más comprobaciones. Este problema afecta a YugabyteDB Anywhere: desde 2.0.0 hasta 2.17.3 • https://www.yugabyte.com • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py. This issue affects Yugabyte DB: Lesser then 2.2.0.0 • https://www.yugabyte.com • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-642: External Control of Critical State Data •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary files through the backup upload endpoint by using path traversal characters. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0 • https://www.yugabyte.com • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •