
Cloud Vulnerability DB
A community-led vulnerabilities database
An information disclosure vulnerability (CVE-2024-11165) exists in YugabyteDB Anywhere's backup configuration process where the SAS token is not properly masked in the configuration response. This oversight results in sensitive information leakage within the yb_backup log files, exposing the SAS token in plaintext. The vulnerability affects YugabyteDB Anywhere versions from 2.20.0.0 before 2.20.7.0, from 2.23.0.0 before 2.23.1.0, and from 2024.1.0.0 before 2024.1.3.0 (NVD).
The vulnerability is classified as CWE-532 (Insertion of Sensitive Information into Log File). The CVSS v4.0 base score is 5.7 (Medium) with the vector string CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:L. The vulnerability specifically involves the exposure of SAS (Shared Access Signature) tokens in log files during backup operations (NVD).
The exposure of SAS tokens in plaintext within log files could lead to potential unauthorized access to resources associated with these tokens. This creates a security risk as SAS tokens are sensitive credentials that provide access to specific resources (NVD).
The issue has been addressed in YugabyteDB Anywhere versions 2.20.7.0, 2.23.1.0, and 2024.1.3.0. The fix involves masking the SAS token in backup configuration responses and logs (Github Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."