CVE-2024-24565: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. This vulnerability is patched in 5.3.9, 5.4.8, 5.5.4, and 5.6.1.
References
- github.com/advisories/GHSA-475g-vj6c-xf96
- github.com/crate/crate/commit/32d0fc2ebb834ea324eb7ab5d01320a67bc5c3c7
- github.com/crate/crate/commit/4e857d675683095945dd524d6ba03e692c70ecd6
- github.com/crate/crate/commit/b75aeeabf90f51bd96ddb499903928fd10185207
- github.com/crate/crate/commit/c4c97d5a1c52cc2250ea42d062a3d37550c19dd5
- github.com/crate/crate/commit/c5034323f1b56ca5d04b8ef4c6029eb63a5ba172
- github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96
- nvd.nist.gov/vuln/detail/CVE-2024-24565
Detect and mitigate CVE-2024-24565 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →