CVE-2024-48019

5.4 MEDIUM

📋 TL;DR

This path traversal vulnerability in Apache Doris allows authenticated application administrators to read arbitrary files from the server filesystem. Attackers can exploit this to access sensitive system files, configuration data, or other restricted content. All Apache Doris deployments with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Apache Doris
Versions: All versions before 2.1.8 and 3.0.3
Operating Systems: All operating systems running Apache Doris
Default Config Vulnerable: ⚠️ Yes
Notes: Requires application administrator access to exploit. The vulnerability exists in the path handling mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator credentials could be compromised, leading to complete system takeover, data exfiltration of sensitive files (including passwords, keys, configuration files), and potential lateral movement within the network.

🟠

Likely Case

Unauthorized reading of sensitive configuration files, database credentials, or other restricted files that could enable further attacks or data breaches.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access controls, and file system permissions are implemented, though the vulnerability still provides unauthorized file access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access. The vulnerability is straightforward to exploit once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.8 or 3.0.3 or later

Vendor Advisory: https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr

Restart Required: Yes

Instructions:

1. Backup your Doris configuration and data. 2. Download the patched version (2.1.8 or 3.0.3+) from the official Apache Doris website. 3. Stop the Doris service. 4. Replace the existing installation with the patched version. 5. Restart the Doris service. 6. Verify the version is updated.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit application administrator accounts to only trusted personnel and implement strong authentication controls.

File System Permissions Hardening

linux

Restrict file system permissions for the Doris process to only necessary directories using chroot, containerization, or strict file permissions.

chmod 750 /path/to/doris/data
chown doris:doris /path/to/doris/data

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Apache Doris instances from sensitive systems and data.
  • Deploy web application firewall (WAF) rules to detect and block path traversal patterns in requests.

🔍 How to Verify

Check if Vulnerable:

Check your Apache Doris version. If it's earlier than 2.1.8 (for 2.x branch) or earlier than 3.0.3 (for 3.x branch), you are vulnerable.

Check Version:

Connect to Doris and run: SHOW VERSION; or check the Doris web UI dashboard for version information.

Verify Fix Applied:

After patching, verify the version shows 2.1.8 or higher (for 2.x) or 3.0.3 or higher (for 3.x). Test that path traversal attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Doris logs
  • Requests containing '../' sequences or other path traversal patterns
  • Multiple failed file access attempts from administrator accounts

Network Indicators:

  • HTTP requests with path traversal patterns (../, ..\, encoded equivalents) to Doris endpoints
  • Unusual outbound data transfers following file access patterns

SIEM Query:

source="doris.logs" AND ("../" OR "..\\" OR "%2e%2e%2f" OR "%252e%252e%252f")

🔗 References

📤 Share & Export