Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-31131
HistoryMay 15, 2023 - 9:05 p.m.

CVE-2023-31131 Arbitrary File Write when Extracting Tarballs in greenplum-db

2023-05-1521:05:49
CWE-22
GitHub_M
www.cve.org
1
cve-2023-31131
arbitrary file write
greenplum database
postgresql
path traversal
upgrade
vulnerability

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.0%

Greenplum Database (GPDB) is an open source data warehouse based on PostgreSQL. In versions prior to 6.22.3 Greenplum Database used an unsafe methods to extract tar files within GPPKGs. greenplum-db is vulnerable to path traversal leading to arbitrary file writes. An attacker can use this vulnerability to overwrite data or system files potentially leading to crash or malfunction of the system. Any files which are accessible to the running process are at risk. All users are requested to upgrade to Greenplum Database version 6.23.2 or higher. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "greenplum-db",
    "product": "gpdb",
    "versions": [
      {
        "version": "< 6.22.3",
        "status": "affected"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.0%

Related for CVELIST:CVE-2023-31131