We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-48019

Apache Doris: allows admin users to read arbitrary files through the REST API



Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.

Reserved 2024-10-08 | Published 2025-02-04 | Updated 2025-02-07 | Assigner apache

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-552 Files or Directories Accessible to External Parties

Product status

Default status
unaffected

2.1.0 before 2.1.8
affected

3.0.0 before 3.0.3
affected

Credits

Man Yue Mo of the GitHub Security Lab team finder

References

lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr vendor-advisory

cve.org (CVE-2024-48019)

nvd.nist.gov (CVE-2024-48019)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-48019

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.