CrateDB database has an arbitrary file read vulnerability
Package
Affected versions
< 5.3.9
>= 5.4.0, < 5.4.8
>= 5.5.0, < 5.5.4
= 5.6.0
Patched versions
5.3.9
5.4.8
5.5.4
5.6.1
Description
Published by the National Vulnerability Database
Jan 30, 2024
Published to the GitHub Advisory Database
Jan 30, 2024
Reviewed
Jan 30, 2024
Last updated
Jan 30, 2024
Summary
There is an arbitrary file read vulnerability in the CrateDB database, and authenticated CrateDB database users can read any file on the system.
Details
There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage.
PoC
Impact
This vulnerability affects all current versions of the CrateDB database. Attackers who exploit this vulnerability to obtain sensitive information may carry out further attacks, while also affecting CrateDB Cloud Clusters.
References