CVE-2024-6908

Source
https://cve.org/CVERecord?id=CVE-2024-6908
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6908.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-6908
Published
2024-07-19T15:15:10.747Z
Modified
2026-02-19T08:41:00.015935Z
Severity
  • 6.0 (Medium) CVSS_V4 - CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:P/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Improper privilege management in Yugabyte Platform allows authenticated admin users to escalate privileges to SuperAdmin via a crafted PUT HTTP request, potentially leading to unauthorized access to sensitive system functions and data.

References

Affected packages

Git / github.com/yugabyte/yugabyte-db

Affected ranges

Type
GIT
Repo
https://github.com/yugabyte/yugabyte-db
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6908.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "192138964171095151355969977394648803083",
                "150185239929966929246043502681959992876",
                "48249719473128898346638968896278204201",
                "93583001150838198363284357834164625722",
                "240980066450593003092558615534753796318",
                "30872787694841923490617795693088377474",
                "306130394003671881438949679276819739079"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-6908-96bccd8f",
        "source": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662",
        "target": {
            "file": "managed/src/main/java/com/yugabyte/yw/controllers/UsersController.java"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 650.0,
            "function_hash": "181171011168389764701270601946922006677"
        },
        "signature_type": "Function",
        "id": "CVE-2024-6908-be44e612",
        "source": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662",
        "target": {
            "function": "changeRole",
            "file": "managed/src/main/java/com/yugabyte/yw/controllers/UsersController.java"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "23136404727938099402094247942867305506",
                "268109784697180586888374699270357321183",
                "170928423322184071298563136088902474222",
                "326561129504036851046669166642755468371",
                "298104032484539792911617455937168306915",
                "149115523116181273154637434622715853811"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2024-6908-c584c740",
        "source": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662",
        "target": {
            "file": "managed/src/test/java/com/yugabyte/yw/controllers/UsersControllerTest.java"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 1127.0,
            "function_hash": "147296581769899178307756026745589266932"
        },
        "signature_type": "Function",
        "id": "CVE-2024-6908-d87757c9",
        "source": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662",
        "target": {
            "function": "create",
            "file": "managed/src/main/java/com/yugabyte/yw/controllers/UsersController.java"
        }
    }
]