First published: Mon May 15 2023(Updated: )
Greenplum Database (GPDB) is an open source data warehouse based on PostgreSQL. In versions prior to 6.22.3 Greenplum Database used an unsafe methods to extract tar files within GPPKGs. greenplum-db is vulnerable to path traversal leading to arbitrary file writes. An attacker can use this vulnerability to overwrite data or system files potentially leading to crash or malfunction of the system. Any files which are accessible to the running process are at risk. All users are requested to upgrade to Greenplum Database version 6.23.2 or higher. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Greenplum Database | <6.22.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31131 is a vulnerability in the Greenplum Database (GPDB) prior to version 6.22.3 that allows path traversal leading to arbitrary file writes.
CVE-2023-31131 has a severity rating of 9.1 (critical).
Greenplum Database (GPDB) prior to version 6.22.3 is affected by CVE-2023-31131.
An attacker can exploit CVE-2023-31131 by performing a path traversal attack to write arbitrary files.
To fix CVE-2023-31131, update Greenplum Database to version 6.22.3 or later.