We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-11165



Description

An information disclosure vulnerability exists in the backup configuration process where the SAS token is not masked in the configuration response. This oversight results in sensitive information leakage within the yb_backup log files, exposing the SAS token in plaintext. The leakage occurs during the backup procedure, leading to potential unauthorized access to resources associated with the SAS token. This issue affects YugabyteDB Anywhere: from 2.20.0.0 before 2.20.7.0, from 2.23.0.0 before 2.23.1.0, from 2024.1.0.0 before 2024.1.3.0.

Reserved 2024-11-12 | Published 2024-11-13 | Updated 2024-11-21 | Assigner Yugabyte


MEDIUM: 5.7CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:L

Problem types

CWE-532: Information Exposure Through Log Files

Product status

Default status
unaffected

2.20.0.0 before 2.20.7.0
affected

2.23.0.0 before 2.23.1.0
affected

2024.1.0.0 before 2024.1.3.0
affected

References

github.com/...ommit/920989b6c0db0222bb7a0cce46febc76cf72d438

cve.org (CVE-2024-11165)

nvd.nist.gov (CVE-2024-11165)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-11165

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.