{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-27438","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2024-02-25T14:09:13.555Z","datePublished":"2024-03-21T09:39:21.894Z","dateUpdated":"2025-02-13T17:46:29.362Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache Doris","vendor":"Apache Software Foundation","versions":[{"lessThanOrEqual":"2.0.4","status":"affected","version":"1.2.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Download of Code Without Integrity Check vulnerability in Apache Doris.<br>The jdbc driver files used for JDBC catalog is not checked and may&nbsp;resulting in remote command execution.<br>Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This&nbsp;code snippet will be run when catalog is initializing without any check.<br><p>This issue affects Apache Doris: from 1.2.0 through 2.0.4.</p><p>Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue.</p>"}],"value":"Download of Code Without Integrity Check vulnerability in Apache Doris.\nThe jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution.\nOnce the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check.\nThis issue affects Apache Doris: from 1.2.0 through 2.0.4.\n\nUsers are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue."}],"metrics":[{"other":{"content":{"text":"important"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-494","description":"CWE-494: Download of Code Without Integrity Check","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2024-05-01T19:06:49.539Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh"},{"url":"http://www.openwall.com/lists/oss-security/2024/03/21/1"}],"source":{"discovery":"UNKNOWN"},"title":"Apache Doris: Downloading arbitrary remote jar files resulting in remote command execution","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"apache","product":"doris","cpes":["cpe:2.3:a:apache:doris:1.2.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.2.0","status":"affected","lessThanOrEqual":"2.0.4","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-07-17T17:40:13.729326Z","id":"CVE-2024-27438","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-17T17:40:16.663Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:34:52.345Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh"},{"url":"http://www.openwall.com/lists/oss-security/2024/03/21/1","tags":["x_transferred"]}]}]}}