First published: Mon May 08 2023(Updated: )
Security vulnerability in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file. An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process. Solution: 1. upgrade to bRPC >= 1.5.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache bRPC | >=0.9.0<1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31039 is a security vulnerability in Apache bRPC <1.5.0 that allows arbitrary code execution through the ServerOptions::pid_file parameter.
The CVE-2023-31039 vulnerability can be exploited by an attacker who has influence over the ServerOptions pid_file parameter, allowing them to execute arbitrary code with the permissions of the bRPC server.
The severity of CVE-2023-31039 is critical, with a severity score of 9.8.
Versions of Apache bRPC before 1.5.0, including version 0.9.0, are affected by CVE-2023-31039.
The fix for CVE-2023-31039 is to upgrade to a version of Apache bRPC that is equal to or higher than 1.5.0.