Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris.
Application administrators can read arbitrary
files from the server filesystem through path traversal.
Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache doris |
|
CPEs | cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache doris |
Fri, 07 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 04 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 04 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue. | |
Title | Apache Doris: allows admin users to read arbitrary files through the REST API | |
Weaknesses | CWE-22 CWE-552 |
|
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-07T21:20:37.526Z
Reserved: 2024-10-08T12:27:54.136Z
Link: CVE-2024-48019

Updated: 2025-02-04T19:02:30.852Z

Status : Analyzed
Published: 2025-02-04T19:15:31.733
Modified: 2025-06-09T19:49:43.753
Link: CVE-2024-48019

No data.