Apache

Doris

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.64%
  • Veröffentlicht 04.02.2025 19:15:31
  • Zuletzt bearbeitet 09.06.2025 19:49:43

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem throug...

  • EPSS 2.91%
  • Veröffentlicht 21.03.2024 10:15:08
  • Zuletzt bearbeitet 17.06.2025 13:50:01

Download of Code Without Integrity Check vulnerability in Apache Doris. The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution. Once the attacker is authorized to create a JDBC catalog, he/she can use...

  • EPSS 0.03%
  • Veröffentlicht 21.03.2024 10:15:07
  • Zuletzt bearbeitet 17.06.2025 13:50:12

Possible race condition vulnerability in Apache Doris. Some of code using `chmod()` method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file. This could theoretically happen, but the impact would ...

  • EPSS 0.19%
  • Veröffentlicht 12.03.2024 11:15:46
  • Zuletzt bearbeitet 30.06.2025 12:14:35

The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks. Users are recommended to upgrade to version 2.0.0 + or 1.2.8, which fixes this issue.

  • EPSS 0.38%
  • Veröffentlicht 18.12.2023 09:15:05
  • Zuletzt bearbeitet 21.11.2024 08:21:03

The api /api/snapshot and /api/get_log_file would allow unauthenticated access. It could allow a DoS attack or get arbitrary files from FE node. Please upgrade to 2.0.3 to fix these issues.

  • EPSS 1.87%
  • Veröffentlicht 26.04.2022 16:15:47
  • Zuletzt bearbeitet 21.11.2024 06:49:29

Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used for ldap password, which may lead to information disclosure.