First published: Mon Jan 22 2024(Updated: )
Dremio before 24.3.1 allows path traversal. An authenticated user who has no privileges on certain folders (and the files and datasets in these folders) can access these folders, files, and datasets. To be successful, the user must have access to the source and at least one folder in the source. Affected versions are: 24.0.0 through 24.3.0, 23.0.0 through 23.2.3, and 22.0.0 through 22.2.2. Fixed versions are: 24.3.1 and later, 23.2.4 and later, and 22.2.3 and later.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dremio | >=22.0.0<22.2.3 | |
Dremio | >=23.0.0<23.2.4 | |
Dremio | >=24.0.0<24.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23768 is categorized as a medium severity vulnerability due to the potential for unauthorized access to files and datasets.
To fix CVE-2024-23768, upgrade Dremio to version 24.3.1 or later to eliminate the path traversal vulnerability.
CVE-2024-23768 affects Dremio versions before 24.3.1, specifically versions 22.2.3 and below, as well as 23.2.4 and below.
An attacker needs to be an authenticated user with access to the source and at least one folder in the source to exploit CVE-2024-23768.
The implications of CVE-2024-23768 include the risk of unauthorized access to sensitive files and datasets by users lacking proper privileges.