Lucene search

K
githubGitHub Advisory DatabaseGHSA-7M75-X27W-R52R
HistoryJun 03, 2024 - 12:30 p.m.

qdrant input validation failure

2024-06-0312:30:38
CWE-20
GitHub Advisory Database
github.com
4
qdrant vulnerability
arbitrary file manipulation
snapshot recovery
symlink attack
system takeover
software update

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.3

Confidence

High

EPSS

0

Percentile

9.0%

qdrant/qdrant version 1.9.0-dev is vulnerable to arbitrary file read and write during the snapshot recovery process. Attackers can exploit this vulnerability by manipulating snapshot files to include symlinks, leading to arbitrary file read by adding a symlink that points to a desired file on the filesystem and arbitrary file write by including a symlink and a payload file in the snapshot’s directory structure. This vulnerability allows for the reading and writing of arbitrary files on the server, which could potentially lead to a full takeover of the system. The issue is fixed in version v1.9.0.

Affected configurations

Vulners
Node
qdrantqdrant-clientRange<1.9.0
VendorProductVersionCPE
qdrantqdrant-client*cpe:2.3:a:qdrant:qdrant-client:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.3

Confidence

High

EPSS

0

Percentile

9.0%

Related for GHSA-7M75-X27W-R52R