Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-475g-vj6c-xf96

Опубликовано: 30 янв. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.7

Описание

CrateDB database has an arbitrary file read vulnerability

Summary

There is an arbitrary file read vulnerability in the CrateDB database, and authenticated CrateDB database users can read any file on the system.

Details

There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.

PoC

CREATE TABLE info_leak(info_leak STRING); COPY info_leak FROM '/etc/passwd' with (format='csv', header=false); or COPY info_leak FROM '/crate/config/crate.yml' with (format='csv', header=false); SELECT * FROM info_leak;

image

Impact

This vulnerability affects all current versions of the CrateDB database. Attackers who exploit this vulnerability to obtain sensitive information may carry out further attacks, while also affecting CrateDB Cloud Clusters. image

Пакеты

Наименование

io.crate:crate

maven
Затронутые версииВерсия исправления

< 5.3.9

5.3.9

Наименование

io.crate:crate

maven
Затронутые версииВерсия исправления

>= 5.4.0, < 5.4.8

5.4.8

Наименование

io.crate:crate

maven
Затронутые версииВерсия исправления

>= 5.5.0, < 5.5.4

5.5.4

Наименование

io.crate:crate

maven
Затронутые версииВерсия исправления

= 5.6.0

5.6.1

EPSS

Процентиль: 99%
0.84057
Высокий

5.7 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.7
nvd
около 2 лет назад

CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. This vulnerability is patched in 5.3.9, 5.4.8, 5.5.4, and 5.6.1.

EPSS

Процентиль: 99%
0.84057
Высокий

5.7 Medium

CVSS3

Дефекты

CWE-22