2024-08-01 14:03:18 +00:00

64 lines
2.7 KiB
JSON

{
"id": "CVE-2024-27438",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-21T10:15:08.370",
"lastModified": "2024-08-01T13:48:27.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Download of Code Without Integrity Check vulnerability in Apache Doris.\nThe jdbc driver files used for JDBC catalog is not checked and may\u00a0resulting in remote command execution.\nOnce the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This\u00a0code snippet will be run when catalog is initializing without any check.\nThis issue affects Apache Doris: from 1.2.0 through 2.0.4.\n\nUsers are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue.\n\n"
},
{
"lang": "es",
"value": "Descarga de C\u00f3digo Sin Integridad Check vulnerabilidad en Apache Doris. Los archivos del controlador jdbc utilizados para el cat\u00e1logo JDBC no est\u00e1n verificados y pueden provocar la ejecuci\u00f3n remota de comandos. Una vez que el atacante est\u00e1 autorizado a crear un cat\u00e1logo JDBC, puede utilizar un archivo jar de controlador arbitrario con un fragmento de c\u00f3digo no verificado. Este fragmento de c\u00f3digo se ejecutar\u00e1 cuando el cat\u00e1logo se inicialice sin ninguna verificaci\u00f3n. Este problema afecta a Apache Doris: desde 1.2.0 hasta 2.0.4. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.0.5 o 2.1.x, que soluciona el problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/21/1",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh",
"source": "security@apache.org"
}
]
}