5.4
CVE-2024-0006
- EPSS 0.05%
- Published 19.07.2024 15:15:09
- Last modified 21.11.2024 08:45:41
- Source security@yugabyte.com
- Teams watchlist Login
- Open Login
Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendoryugabyte
≫
Product
yugabytedb
Default Statusunknown
Version <
2.18.9.0
Version
2.18.0.0
Status
affected
Version <
2.20.2.3
Version
2.20.0.0
Status
affected
Version <
2024.1.1.0
Version
2024.0.0.0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.168 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@yugabyte.com | 5.4 | 0 | 0 |
CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.