Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris.
Application administrators can read arbitrary
files from the server filesystem through path traversal.
Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 04 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 04 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue. | |
Title | Apache Doris: allows admin users to read arbitrary files through the REST API | |
Weaknesses | CWE-22 CWE-552 |
|
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-02-04T18:19:52.467Z
Updated: 2025-02-07T21:20:37.526Z
Reserved: 2024-10-08T12:27:54.136Z
Link: CVE-2024-48019

Updated: 2025-02-04T19:02:30.852Z

Status : Received
Published: 2025-02-04T19:15:31.733
Modified: 2025-02-07T22:15:12.300
Link: CVE-2024-48019

No data.