Lucene search

K
cve[email protected]CVE-2023-31039
HistoryMay 08, 2023 - 9:15 a.m.

CVE-2023-31039

2023-05-0809:15:09
CWE-20
web.nvd.nist.gov
28
cve-2023-31039
apache brpc
security vulnerability
arbitrary code execution
serveroptions
upgrade
patch
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.4%

Security vulnerabilityΒ in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file.
An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process.

Solution:

  1. upgrade to bRPC >= 1.5.0, download link:Β  https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/
  2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:Β  https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218

Affected configurations

Vulners
NVD
Node
apachebrpcRange≀1.5.0
CPENameOperatorVersion
apache:brpcapache brpclt1.5.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache bRPC",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "1.5.0",
        "status": "affected",
        "version": "0.9.0",
        "versionType": "semver"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.4%

Related for CVE-2023-31039