Описание
CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. This vulnerability is patched in 5.3.9, 5.4.8, 5.5.4, and 5.6.1.
Ссылки
- Patch
- ExploitVendor Advisory
- Patch
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.3.9 (исключая)Версия от 5.4.0 (включая) до 5.4.8 (исключая)Версия от 5.5.0 (включая) до 5.5.4 (исключая)Версия от 5.6.0 (включая) до 5.6.1 (исключая)
Одно из
cpe:2.3:a:cratedb:cratedb:*:*:*:*:*:*:*:*
cpe:2.3:a:cratedb:cratedb:*:*:*:*:*:*:*:*
cpe:2.3:a:cratedb:cratedb:*:*:*:*:*:*:*:*
cpe:2.3:a:cratedb:cratedb:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.84057
Высокий
5.7 Medium
CVSS3
6.5 Medium
CVSS3
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 5.7
github
около 2 лет назад
CrateDB database has an arbitrary file read vulnerability
EPSS
Процентиль: 99%
0.84057
Высокий
5.7 Medium
CVSS3
6.5 Medium
CVSS3
Дефекты
CWE-22