Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-13699

Опубликовано: 23 дек. 2025
Источник: debian
EPSS Низкий

Описание

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mariadbfixed1:11.8.5-1package
mariadbfixed11.8.6-0+deb13u1trixiepackage
mariadbno-dsabookwormpackage
mariadb-10.5removedpackage
mariadb-10.5postponedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2417693

  • https://www.zerodayinitiative.com/advisories/ZDI-25-1025/

  • https://jira.mariadb.org/browse/MDEV-37483

  • Fixed in MariaDB: 10.6.24, 10.11.15, 11.4.9, 11.8.4

EPSS

Процентиль: 43%
0.00211
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
3 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
redhat
4 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
nvd
3 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
msrc
3 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability

suse-cvrf
3 месяца назад

Security update for mariadb

EPSS

Процентиль: 43%
0.00211
Низкий
Уязвимость CVE-2025-13699