{"uuid": "ce2fb20d-f19e-4896-9266-d95771831ddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-11165", "type": "seen", "source": "https://t.me/cvedetector/10829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11165 - YugabyteDB Anywhere SAS Token Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-11165 \nPublished : Nov. 13, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : An information disclosure vulnerability exists in the backup configuration process where the SAS token is not masked in the configuration response. This oversight results in sensitive information leakage within the yb_backup log files, exposing the SAS token in plaintext. The leakage occurs during the backup procedure, leading to potential unauthorized access to resources associated with the SAS token.\u00a0This issue affects YugabyteDB Anywhere: from 2.20.0.0 before 2.20.7.0, from 2.23.0.0 before 2.23.1.0, from 2024.1.0.0 before 2024.1.3.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T17:13:40.000000Z"}