Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14Y3IyLWg4aHYtNjIyN84AA8mS
qdrant is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint
qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the /collections/{name}/snapshots/upload
endpoint. By manipulating the name
parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as /root/poc.txt
. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14Y3IyLWg4aHYtNjIyN84AA8mS
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 5 months ago
Updated: 5 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-xcr2-h8hv-6227, CVE-2024-3584
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-3584
- https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a
- https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73
- https://github.com/advisories/GHSA-xcr2-h8hv-6227
Blast Radius: 1.0
Affected Packages
cargo:qdrant
Dependent packages: 0Dependent repositories: 0
Downloads: 636 total
Affected Version Ranges: = 1.9.0-dev
Fixed in: 1.9.0
All affected versions:
All unaffected versions: 0.0.0