Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-13699

Опубликовано: 23 дек. 2025
Источник: debian

Описание

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mariadbfixed1:11.8.5-1package
mariadbno-dsatrixiepackage
mariadbno-dsabookwormpackage
mariadb-10.5removedpackage
mariadb-10.5postponedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2417693

  • https://www.zerodayinitiative.com/advisories/ZDI-25-1025/

  • https://jira.mariadb.org/browse/MDEV-37483

  • Fixed in MariaDB: 10.6.24, 10.11.15, 11.4.9, 11.8.4

Связанные уязвимости

CVSS3: 7
ubuntu
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
nvd
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
msrc
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability

suse-cvrf
около 1 месяца назад

Security update for mariadb

suse-cvrf
около 1 месяца назад

Security update for mariadb