Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00NzVnLXZqNmMteGY5Ns4AA481

CrateDB database has an arbitrary file read vulnerability

Summary

There is an arbitrary file read vulnerability in the CrateDB database, and authenticated CrateDB database users can read any file on the system.

Details

There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.

PoC

CREATE TABLE info_leak(info_leak STRING);
COPY info_leak FROM '/etc/passwd' with (format='csv', header=false); or COPY info_leak FROM '/crate/config/crate.yml' with (format='csv', header=false);
SELECT * FROM info_leak;

image

Impact

This vulnerability affects all current versions of the CrateDB database. Attackers who exploit this vulnerability to obtain sensitive information may carry out further attacks, while also affecting CrateDB Cloud Clusters.
image

Permalink: https://github.com/advisories/GHSA-475g-vj6c-xf96
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00NzVnLXZqNmMteGY5Ns4AA481
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 3 months ago
Updated: 3 months ago


CVSS Score: 5.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Identifiers: GHSA-475g-vj6c-xf96, CVE-2024-24565
References: Repository: https://github.com/crate/crate
Blast Radius: 1.0

Affected Packages

maven:io.crate:crate
Affected Version Ranges: = 5.6.0, >= 5.5.0, < 5.5.4, >= 5.4.0, < 5.4.8, < 5.3.9
Fixed in: 5.6.1, 5.5.4, 5.4.8, 5.3.9