Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8g8j-r87h-p36x

Опубликовано: 26 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.4

Описание

Vitess users with backup storage access can gain unauthorized access to production deployment environments

Impact

Any user with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there.

Patches

Fixes are expected to be released with versions v23.0.3 and v22.0.4 See fix commit at https://github.com/vitessio/vitess/commit/4c0173293907af9cb942a6683c465c3f1e9fdb5c

Workarounds

If maintainers intended to use an external decompressor then they can always specify that decompressor command in the --external-decompressor flag value for vttablet and vtbackup. That then overrides any value specified in the manifest file.

If maintainers did not intend to use an external decompressor, nor an internal one, then they can specify a value such as cat or tee in the --external-decompressor flag value for vttablet and vtbackup to ensure that a harmless command is always used.

References

Users can read more about the issue here: https://github.com/vitessio/vitess/issues/19459

Пакеты

Наименование

vitess.io/vitess

go
Затронутые версииВерсия исправления

<= 0.23.2

Отсутствует

EPSS

Процентиль: 19%
0.00059
Низкий

8.4 High

CVSS4

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 9.9
nvd
29 дней назад

Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that arbitrary code is later executed when that backup is restored. This can be used to provide that attacker with unintended/unauthorized access to the production deployment environment — allowing them to access information available in that environment as well as run any additional arbitrary commands there. Versions 23.0.3 and 22.0.4 contain a patch. Some workarounds are available. Those who intended to use an external decompressor then can always specify that decompressor command in the `--external-decompressor` flag value for `vttablet` and `vtbackup`. That then overrides any value specified in the manifest file. Those who did not intend to use an external decompressor, nor an internal one, can specify a value such as `cat` or `tee` in the `--external-de

msrc
23 дня назад

Vitess users with backup storage access can gain unauthorized access to production deployment environments

EPSS

Процентиль: 19%
0.00059
Низкий

8.4 High

CVSS4

Дефекты

CWE-78