{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-24780","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2024-01-30T10:43:03.969Z","datePublished":"2025-05-14T10:42:20.580Z","dateUpdated":"2026-02-26T18:28:09.987Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache IoTDB","vendor":"Apache Software Foundation","versions":[{"lessThan":"1.3.4","status":"affected","version":"1.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Y4 tacker"},{"lang":"en","type":"finder","value":"Nbxiglk"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attacker who has&nbsp;privilege to create UDF can register malicious function from&nbsp;untrusted URI.</p><p>This issue affects Apache IoTDB: from 1.0.0 before 1.3.4.</p><p>Users are recommended to upgrade to version 1.3.4, which fixes the issue.</p>"}],"value":"Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attacker who has privilege to create UDF can register malicious function from untrusted URI.\n\nThis issue affects Apache IoTDB: from 1.0.0 before 1.3.4.\n\nUsers are recommended to upgrade to version 1.3.4, which fixes the issue."}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"description":"Remote Code Execution with untrusted URI of User-defined function","lang":"en"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-05-14T10:42:20.580Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/xphtm98v3zsk9vlpfh481m1ry2ctxvmj"}],"source":{"discovery":"UNKNOWN"},"title":"Apache IoTDB: Remote Code Execution with untrusted URI of User-defined function","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2025/05/14/2"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-05-14T11:03:09.771Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2024-24780","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-05-15T04:02:01.279763Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T18:28:09.987Z"}}]}}