Skytable is a NoSQL database with automated snapshots and TLS. Versions prior to 0.5.1 are vulnerable to a a directory traversal attack enabling remotely connected clients to destroy and/or manipulate critical files on the host's file system. This security bug has been patched in version 0.5.1. There are no known workarounds aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/skytable/skytable/security/advisories/GHSA-2hj9-cxmc-m4g7 | Third Party Advisory |
https://security.skytable.io/ve/s/00001.html | Patch Third Party Advisory |
https://github.com/skytable/skytable/blob/next/CHANGELOG.md#version-051-2021-03-17 | Release Notes Third Party Advisory |
https://github.com/skytable/skytable/commit/38b011273bb92b83c61053ae2fcd80aa9320315c#diff-1cdcf1a793c71ec658782437e4da7e3a37042bc1e2c12545942e9a14679c4b7e | Patch Third Party Advisory |
Configurations
Information
Published : 2021-08-03 10:15
Updated : 2021-08-11 10:05
NVD link : CVE-2021-32814
Mitre link : CVE-2021-32814
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
skytable
- skytable