cve/2024/CVE-2024-6895.md

21 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-6895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6895)
![](https://img.shields.io/static/v1?label=Product&message=YugabyteDB%20Anywhere&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.14.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.16.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.18.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.20.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brightgreen)
### Description
Insufficient authentication in user account management in Yugabyte Platform allows local network attackers with a compromised user session to change critical security information without re-authentication. An attacker with user session and access to application can modify settings such as password and email without being prompted for the current password, enabling account takeover.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds