{"uuid": "a21b5eb3-0497-45ea-86d7-c9869de8db09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48019", "type": "seen", "source": "https://t.me/cvedetector/17241", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48019 - Apache Doris Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48019 \nPublished : Feb. 4, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris.  \n  \n  \nApplication administrators can read arbitrary  \nfiles from the server filesystem through path traversal.  \n  \n  \nUsers are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T22:15:27.000000Z"}