logo

CVE-2024-24565 io.crate:crate

Package

Manager: maven
Name: io.crate:crate
Vulnerable Version: >=0 <5.3.9 || >=5.4.0 <5.4.8 || >=5.5.0 <5.5.4 || =5.6.0 || >=5.6.0 <5.6.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.85169 pctl0.99311

Details

CrateDB database has an arbitrary file read vulnerability ### Summary There is an arbitrary file read vulnerability in the CrateDB database, and authenticated CrateDB database users can read any file on the system. ### Details There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. ### PoC ``` CREATE TABLE info_leak(info_leak STRING); COPY info_leak FROM '/etc/passwd' with (format='csv', header=false); or COPY info_leak FROM '/crate/config/crate.yml' with (format='csv', header=false); SELECT * FROM info_leak; ``` ![image](https://user-images.githubusercontent.com/154296962/292985975-ff5f2fb8-1a3f-4b49-9951-cd1fc6e78031.png) ### Impact This vulnerability affects all current versions of the CrateDB database. Attackers who exploit this vulnerability to obtain sensitive information may carry out further attacks, while also affecting CrateDB Cloud Clusters. ![image](https://user-images.githubusercontent.com/154296962/292986215-aec5adfe-38cc-4f31-bf86-c50ecbb44d5d.png)

Metadata

Created: 2024-01-30T20:57:16Z
Modified: 2024-01-30T20:57:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-475g-vj6c-xf96/GHSA-475g-vj6c-xf96.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-475g-vj6c-xf96
Finding: F063
Auto approve: 1