Lucene search

K
cve[email protected]CVE-2023-31131
HistoryMay 15, 2023 - 10:15 p.m.

CVE-2023-31131

2023-05-1522:15:12
CWE-22
web.nvd.nist.gov
20
greenplum database
gpdb
cve-2023-31131
data warehouse
postgresql
path traversal
arbitrary file writes
vulnerability
system files
upgrade

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.0%

Greenplum Database (GPDB) is an open source data warehouse based on PostgreSQL. In versions prior to 6.22.3 Greenplum Database used an unsafe methods to extract tar files within GPPKGs. greenplum-db is vulnerable to path traversal leading to arbitrary file writes. An attacker can use this vulnerability to overwrite data or system files potentially leading to crash or malfunction of the system. Any files which are accessible to the running process are at risk. All users are requested to upgrade to Greenplum Database version 6.23.2 or higher. There are no known workarounds for this vulnerability.

Affected configurations

Vulners
NVD
Node
greenplum-dbgpdbRange<6.22.3

CNA Affected

[
  {
    "vendor": "greenplum-db",
    "product": "gpdb",
    "versions": [
      {
        "version": "< 6.22.3",
        "status": "affected"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.0%

Related for CVE-2023-31131