Vulnerability Description
Scylladb is a NoSQL data store using the seastar framework, compatible with Apache Cassandra. Authenticated users who are authorized to create tables in a keyspace can escalate their privileges to access a table in the same keyspace, even if they don't have permissions for that table. This issue has not yet been patched. A workaround to address this issue is to disable CREATE privileges on a keyspace, and create new tables on behalf of other users.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scylladb | Scylladb | <= 5.2.8 |
Related Weaknesses (CWE)
References
- https://github.com/scylladb/scylladb/security/advisories/GHSA-ww5v-p45p-3vhqVendor Advisory
- https://github.com/scylladb/scylladb/security/advisories/GHSA-ww5v-p45p-3vhqVendor Advisory
FAQ
What is CVE-2023-33972?
CVE-2023-33972 is a vulnerability with a CVSS score of 7.2 (HIGH). Scylladb is a NoSQL data store using the seastar framework, compatible with Apache Cassandra. Authenticated users who are authorized to create tables in a keyspace can escalate their privileges to acc...
How severe is CVE-2023-33972?
CVE-2023-33972 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33972?
Check the references section above for vendor advisories and patch information. Affected products include: Scylladb Scylladb.