6 matches found
CVE-2024-26307
Possible race condition vulnerability in Apache Doris.Some of code using chmod() method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file.This could theoretically happen, but the impact would be minimal.This issue affects Apache Doris: before 1....
CVE-2022-23942
Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used for ldap password, which may lead to information disclosure.
CVE-2024-27438
Download of Code Without Integrity Check vulnerability in Apache Doris.The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution.Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snip...
CVE-2024-48019
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitraryfiles from the server filesystem through path traversal. Users are recommended to upgrade t...
CVE-2023-41313
The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks.Users are recommended to upgrade to version 2.0.0 + or 1.2.8, which fixes this issue.
CVE-2023-41314
The api /api/snapshot and /api/get_log_file would allow unauthenticated access.It could allow a DoS attack or get arbitrary files from FE node.Please upgrade to 2.0.3 to fix these issues.