CVE-2023-29194: vitess allows users to create keyspaces that can deny access to already existing keyspaces
4.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22866%
CWE
Published
4/11/2023
Updated
5/20/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
vitess.io/vitess | go | < 0.16.1 | 0.16.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing input validation in keyspace management functions. The commit diff shows:
- A new ValidateKeyspaceName function was added to check for '/' characters
- This validation was integrated into both CreateKeyspace and GetKeyspace methods
- Prior to the patch, these functions did not perform this validation, allowing creation/retrieval of invalid keyspace names
- The CWE-20 (Input Validation) mapping confirms this was an input validation failure
- The added test cases in keyspace_test.go specifically test the prevention of '/' characters, demonstrating the previous lack of validation