cve/2024/CVE-2024-0006.md

20 lines
956 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-0006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0006)
![](https://img.shields.io/static/v1?label=Product&message=YugabyteDB%20Anywhere&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.18.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.20.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2024.0.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&color=brightgreen)
### Description
Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds