Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hmmh-292h-3364

Опубликовано: 12 дек. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

Weaviate OSS has path traversal vulnerability via the Shard Movement API

An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.

Пакеты

Наименование

github.com/weaviate/weaviate

go
Затронутые версииВерсия исправления

>= 1.30.0, < 1.30.20

1.30.20

Наименование

github.com/weaviate/weaviate

go
Затронутые версииВерсия исправления

>= 1.31.0-rc.0, < 1.31.19

1.31.19

Наименование

github.com/weaviate/weaviate

go
Затронутые версииВерсия исправления

>= 1.32.0-rc.0, < 1.32.16

1.32.16

Наименование

github.com/weaviate/weaviate

go
Затронутые версииВерсия исправления

>= 1.33.0-rc.0, < 1.33.4

1.33.4

EPSS

Процентиль: 25%
0.00086
Низкий

8.7 High

CVSS4

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.9
nvd
около 2 месяцев назад

An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.

EPSS

Процентиль: 25%
0.00086
Низкий

8.7 High

CVSS4

Дефекты

CWE-22