When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d. Note: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2020/08/08/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/r4cc9cc9c54573babf821c31d5d410fb260d1cd416dc1b225d587be9b@%3Cdev.asterixdb.apache.org%3E | Mailing List Vendor Advisory |
Configurations
Information
Published : 2021-03-01 08:15
Updated : 2021-03-08 07:47
NVD link : CVE-2020-9479
Mitre link : CVE-2020-9479
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
apache
- asterixdb