Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
History

Fri, 07 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
References

Tue, 04 Feb 2025 18:30:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
Title Apache Doris: allows admin users to read arbitrary files through the REST API
Weaknesses CWE-22
CWE-552
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-02-04T18:19:52.467Z

Updated: 2025-02-07T21:20:37.526Z

Reserved: 2024-10-08T12:27:54.136Z

Link: CVE-2024-48019

cve-icon Vulnrichment

Updated: 2025-02-04T19:02:30.852Z

cve-icon NVD

Status : Received

Published: 2025-02-04T19:15:31.733

Modified: 2025-02-07T22:15:12.300

Link: CVE-2024-48019

cve-icon Redhat

No data.