4 results (0.006 seconds)

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 0

04 Feb 2025 — Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache ... • https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-552: Files or Directories Accessible to External Parties •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

21 Mar 2024 — Download of Code Without Integrity Check vulnerability in Apache Doris. The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution. Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check. This issue affects Apache Doris: from 1.2.0 through 2.0.4. Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fix... • http://www.openwall.com/lists/oss-security/2024/03/21/1 • CWE-494: Download of Code Without Integrity Check •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

21 Mar 2024 — Possible race condition vulnerability in Apache Doris. Some of code using `chmod()` method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file. This could theoretically happen, but the impact would be minimal. This issue affects Apache Doris: before 1.2.8, before 2.0.4. Users are recommended to upgrade to version 2.0.4, which fixes the issue. Posible vulnerabilidad de condición de ejecución en Apache Doris. Parte del código que utiliza el método `chmod()`.... • http://www.openwall.com/lists/oss-security/2024/03/21/2 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2024 — The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks. Users are recommended to upgrade to version 2.0.0 + or 1.2.8, which fixes this issue. El método de autenticación en las versiones de Apache Doris anteriores a la 2.0.0 era vulnerable a ataques de sincronización. Se recomienda a los usuarios actualizar a la versión 2.0.0 + o 1.2.8, que soluciona este problema. The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks. Users... • http://www.openwall.com/lists/oss-security/2024/03/10/2 • CWE-208: Observable Timing Discrepancy •