Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
History

Mon, 09 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache doris
CPEs cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache doris

Fri, 07 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
References

Tue, 04 Feb 2025 18:30:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
Title Apache Doris: allows admin users to read arbitrary files through the REST API
Weaknesses CWE-22
CWE-552
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-07T21:20:37.526Z

Reserved: 2024-10-08T12:27:54.136Z

Link: CVE-2024-48019

cve-icon Vulnrichment

Updated: 2025-02-04T19:02:30.852Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-04T19:15:31.733

Modified: 2025-06-09T19:49:43.753

Link: CVE-2024-48019

cve-icon Redhat

No data.