CVE-2024-24565

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-24565
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-24565.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-24565
Aliases
Published
2024-01-30T16:46:15Z
Modified
2025-11-04T20:17:25.530202Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
CrateDB database has an arbitrary file read vulnerability
Details

CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. This vulnerability is patched in 5.3.9, 5.4.8, 5.5.4, and 5.6.1.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/crate/crate

Affected ranges

Type
GIT
Repo
https://github.com/crate/crate
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "5.3.9"
        }
    ]
}
Type
GIT
Repo
https://github.com/crate/crate
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.4.0"
        },
        {
            "fixed": "5.4.8"
        }
    ]
}
Type
GIT
Repo
https://github.com/crate/crate
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.5.0"
        },
        {
            "fixed": "5.5.4"
        }
    ]
}
Type
GIT
Repo
https://github.com/crate/crate
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.6.0"
        },
        {
            "fixed": "5.6.1"
        }
    ]
}

Affected versions

0.*

0.0.6
0.0.7
0.0.8
0.1.0
0.1.1
0.10.0
0.10.1
0.10.2
0.11.0
0.11.1
0.11.2
0.11.3
0.12.0
0.13.0
0.13.1
0.13.2
0.14.0
0.15.0
0.15.1
0.16.0
0.17.0
0.17.1
0.17.2
0.17.3
0.18.0
0.18.1
0.18.2
0.18.3
0.18.4
0.18.5
0.18.6
0.19.0
0.19.1
0.19.10
0.19.11
0.19.12
0.19.13
0.19.14
0.19.2
0.19.3
0.19.4
0.19.5
0.19.6
0.19.7
0.19.8
0.19.9
0.2.0
0.2.1
0.20.0
0.20.1
0.20.2
0.20.3
0.20.4
0.21.0
0.21.1
0.22.0
0.22.1
0.22.2
0.23.0.Beta0
0.23.1
0.23.2
0.24.0
0.25.0
0.26.0
0.27.0
0.28.0
0.29.0
0.3.0
0.30.0
0.31.0
0.32.0
0.32.1
0.32.2
0.33.0
0.34.0
0.34.1
0.35.0
0.35.1
0.35.2
0.35.3
0.35.4
0.35.5
0.35.6
0.35.7
0.35.8
0.36.0
0.36.2
0.36.3
0.36.4
0.37.0
0.37.1
0.37.2
0.37.3
0.37.4
0.37.5
0.38.0
0.39.0
0.4.0
0.40.0
0.40.1
0.40.2
0.40.3
0.41.0
0.42.0
0.43.0
0.45.0
0.46.0
0.47.0
0.49.0
0.5.0
0.6.0
0.7.0
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.9.0
0.9.1
0.9.2

2.*

2.2.0
2.3.0
2.3.1
2.3.2

3.*

3.0.0
3.0.1
3.1.0
3.2.0

4.*

4.0.0
4.1.0
4.2.0
4.2.1
4.3.0
4.4.0
4.5.0
4.6.0
4.7.0
4.8.0

5.*

5.0.0
5.1.0
5.2.0
5.3.0
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.3.6
5.3.7
5.3.8
5.4.0
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.4.6
5.4.7
5.5.0
5.5.1
5.5.2
5.5.3
5.6.0

Other

list

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "id": "CVE-2024-24565-001a9e27",
        "source": "https://github.com/crate/crate/commit/14a336c33752db5b3a82146efb55c757d1d734f9",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "97948461499565271408548590638510619927",
                "318376211251726745464397517936514448672",
                "288295609735365733876469480918026961081",
                "245503503530420965823402586945597271114"
            ]
        },
        "target": {
            "file": "server/src/main/java/org/elasticsearch/Version.java"
        },
        "signature_type": "Line",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-24565-1200047e",
        "source": "https://github.com/crate/crate/commit/ed23d5afa9c22960217db8dbf90e67461a1635bb",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "250450102683043739425720662710849902866",
                "173363420767489663500223931878685445170",
                "167174489652105061883034334346055350895",
                "295137479575845494766195031249073613483"
            ]
        },
        "target": {
            "file": "server/src/main/java/org/elasticsearch/Version.java"
        },
        "signature_type": "Line",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-24565-24f64f84",
        "source": "https://github.com/crate/crate/commit/16e4caa314c190fa9a907ff3644949136e75d226",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "51039015873055425942510269873983942882",
                "223690567670949502805279595495465831129",
                "96702808003505909244004435568643320214",
                "184105513226046550339035802610859750296"
            ]
        },
        "target": {
            "file": "server/src/main/java/org/elasticsearch/Version.java"
        },
        "signature_type": "Line",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-24565-6b2ac7d4",
        "source": "https://github.com/crate/crate/commit/3f27c19b9eb0b67d69f7ba704d3d384074986283",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "158591089354918472498013182694168455973",
                "158533304618116831211859779652179339031",
                "53340190274853161502765653049097024756",
                "27627964893603075053697708281570791505"
            ]
        },
        "target": {
            "file": "server/src/main/java/org/elasticsearch/Version.java"
        },
        "signature_type": "Line",
        "signature_version": "v1"
    }
]