CVE-2024-23768

8.8 HIGH

📋 TL;DR

This CVE describes an improper path traversal vulnerability in Dremio that allows authenticated users with limited folder access to bypass authorization controls and access restricted folders, files, and datasets. The vulnerability affects Dremio versions 22.0.0 through 24.3.0, requiring the user to have access to at least one folder in the source.

💻 Affected Systems

Products:
  • Dremio
Versions: 22.0.0 through 22.2.2, 23.0.0 through 23.2.3, 24.0.0 through 24.3.0
Operating Systems: All platforms running Dremio
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with access to at least one folder in the source. No special configuration needed to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider or compromised account could access sensitive data in restricted folders, potentially exposing confidential information, intellectual property, or regulated data.

🟠

Likely Case

Users with legitimate access to some folders could inadvertently or intentionally access data in folders they shouldn't have permission to view, leading to data leakage and policy violations.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized users accessing data they shouldn't, which can be detected and remediated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of folder paths. The vulnerability is in authorization logic rather than requiring complex manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.3.1 and later, 23.2.4 and later, 22.2.3 and later

Vendor Advisory: https://docs.dremio.com/current/reference/bulletins/2024-01-12-01

Restart Required: Yes

Instructions:

1. Backup your Dremio configuration and data. 2. Download the patched version from Dremio's official distribution channels. 3. Stop the Dremio service. 4. Install the updated version following Dremio's upgrade documentation. 5. Restart the Dremio service. 6. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict User Access

all

Temporarily limit user access to only essential folders and implement stricter access controls while planning the upgrade.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Dremio instances from sensitive data sources
  • Enhance monitoring and auditing of folder access patterns to detect unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Dremio version via web interface or command line. If version falls within affected ranges (22.0.0-22.2.2, 23.0.0-23.2.3, 24.0.0-24.3.0), the system is vulnerable.

Check Version:

Check Dremio web interface under 'About' or run: dremio-admin version

Verify Fix Applied:

After patching, verify the version is 22.2.3+, 23.2.4+, or 24.3.1+. Test that authenticated users can no longer access folders they don't have explicit permissions for.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to restricted folders
  • Multiple failed authorization attempts followed by successful access to unexpected paths

Network Indicators:

  • Increased API calls to folder navigation endpoints from single users

SIEM Query:

source="dremio" AND (event_type="folder_access" OR event_type="authorization_failure") AND user NOT IN authorized_users

🔗 References

📤 Share & Export