{"api_version":"1","generated_at":"2026-04-23T08:15:05+00:00","cve":"CVE-2023-0574","urls":{"html":"https://cve.report/CVE-2023-0574","api":"https://cve.report/api/cve/CVE-2023-0574.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-0574","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-0574"},"summary":{"title":"CVE-2023-0574","description":"Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0 through 2.13.","state":"PUBLIC","assigner":"security@yugabyte.com","published_at":"2023-02-09 15:15:00","updated_at":"2023-11-10 23:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://www.yugabyte.com/","name":"https://www.yugabyte.com/","refsource":"MISC","tags":[],"title":"YugabyteDB—The Distributed SQL Database for Mission-Critical Applications","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-0574","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0574","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"574","vulnerable":"1","versionEndIncluding":"2.13","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yugabyte","cpe5":"yugabytedb_managed","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-0574","ASSIGNER":"security@yugabyte.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0 through 2.13."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-918 Server-Side Request Forgery (SSRF)","cweId":"CWE-918"}]},{"description":[{"lang":"eng","value":"CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes","cweId":"CWE-915"}]},{"description":[{"lang":"eng","value":"CWE-307 Improper Restriction of Excessive Authentication Attempts","cweId":"CWE-307"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"YugaByte, Inc.","product":{"product_data":[{"product_name":"Yugabyte Managed","version":{"version_data":[{"version_value":"2.0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.yugabyte.com/","refsource":"MISC","name":"https://www.yugabyte.com/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"defect":["PLAT-3195"],"discovery":"INTERNAL"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Fixed in version 2.14 onwards .&nbsp;"}],"value":"Fixed in version 2.14 onwards . "}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-02-09 15:15:00","lastModifiedDate":"2023-11-10 23:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yugabyte:yugabytedb_managed:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndIncluding":"2.13","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}