{"uuid": "b3cdcf15-3d01-4dd5-8ac8-ce277a4af019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48019", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48019\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris.\n\n\nApplication administrators can read arbitrary\nfiles from the server filesystem through path traversal.\n\n\nUsers are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.\n\ud83d\udccf Published: 2025-02-04T21:32:28Z\n\ud83d\udccf Modified: 2025-02-08T00:32:16Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-48019\n2. https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr\n3. http://www.openwall.com/lists/oss-security/2025/02/04/2", "creation_timestamp": "2025-02-08T01:04:11.000000Z"}