Server-Side Request Forgery
Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0.0.0 through 2.13.0.0
Problem Types
Type | CWE ID | Description |
---|
CWE | CWE-918 | CWE-918 Server-Side Request Forgery (SSRF) |
CWE | CWE-915 | CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes |
CWE | CWE-307 | CWE-307 Improper Restriction of Excessive Authentication Attempts |
Type: CWE
Description: CWE-918 Server-Side Request Forgery (SSRF)
Type: CWE
Description: CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes
Type: CWE
Description: CWE-307 Improper Restriction of Excessive Authentication Attempts
Metrics
Version | Base score | Base severity | Vector |
---|
3.1 | 6.8 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Impacts
CAPEC ID | Description |
---|
CAPEC-1 | CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-216 | CAPEC-216 Communication Channel Manipulation |
CAPEC-114 | CAPEC-114 Authentication Abuse |
Description: CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
Description: CAPEC-216 Communication Channel Manipulation
Description: CAPEC-114 Authentication Abuse