cvelist/2024/0xxx/CVE-2024-0006.json
2024-07-19 15:00:34 +00:00

94 lines
3.5 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-0006",
"ASSIGNER": "security@yugabyte.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-532 Insertion of Sensitive Information into Log File",
"cweId": "CWE-532"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "YugabyteDB",
"product": {
"product_data": [
{
"product_name": "YugabyteDB Anywhere",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.18.0.0",
"version_value": "2.18.9.0"
},
{
"version_affected": "<",
"version_name": "2.20.0.0",
"version_value": "2.20.2.3"
},
{
"version_affected": "<",
"version_name": "2024.0.0.0",
"version_value": "2024.1.1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/439c6286f1971f9ac6bff2c7215b454c2025c593",
"refsource": "MISC",
"name": "https://github.com/yugabyte/yugabyte-db/commit/439c6286f1971f9ac6bff2c7215b454c2025c593"
},
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/d96e6b629f34d065b47204daeeb44064e484c579",
"refsource": "MISC",
"name": "https://github.com/yugabyte/yugabyte-db/commit/d96e6b629f34d065b47204daeeb44064e484c579"
},
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/5cc7f4e15d6ccccbf97c57946fd0aa630f88c9e2",
"refsource": "MISC",
"name": "https://github.com/yugabyte/yugabyte-db/commit/5cc7f4e15d6ccccbf97c57946fd0aa630f88c9e2"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"defect": [
"PLAT-14286"
],
"discovery": "UNKNOWN"
}
}