
CVE-2024-48019 – Apache Doris: allows admin users to read arbitrary files through the REST API
https://notcve.org/view.php?id=CVE-2024-48019
04 Feb 2025 — Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache ... • https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-552: Files or Directories Accessible to External Parties •

CVE-2024-27438 – Apache Doris: Downloading arbitrary remote jar files resulting in remote command execution
https://notcve.org/view.php?id=CVE-2024-27438
21 Mar 2024 — Download of Code Without Integrity Check vulnerability in Apache Doris. The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution. Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check. This issue affects Apache Doris: from 1.2.0 through 2.0.4. Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fix... • http://www.openwall.com/lists/oss-security/2024/03/21/1 • CWE-494: Download of Code Without Integrity Check •

CVE-2024-26307 – Apache Doris: Possible race condition
https://notcve.org/view.php?id=CVE-2024-26307
21 Mar 2024 — Possible race condition vulnerability in Apache Doris. Some of code using `chmod()` method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file. This could theoretically happen, but the impact would be minimal. This issue affects Apache Doris: before 1.2.8, before 2.0.4. Users are recommended to upgrade to version 2.0.4, which fixes the issue. Posible vulnerabilidad de condición de ejecución en Apache Doris. Parte del código que utiliza el método `chmod()`.... • http://www.openwall.com/lists/oss-security/2024/03/21/2 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2023-41313 – Apache Doris: Timing Attack weakness
https://notcve.org/view.php?id=CVE-2023-41313
12 Mar 2024 — The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks. Users are recommended to upgrade to version 2.0.0 + or 1.2.8, which fixes this issue. El método de autenticación en las versiones de Apache Doris anteriores a la 2.0.0 era vulnerable a ataques de sincronización. Se recomienda a los usuarios actualizar a la versión 2.0.0 + o 1.2.8, que soluciona este problema. The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks. Users... • http://www.openwall.com/lists/oss-security/2024/03/10/2 • CWE-208: Observable Timing Discrepancy •