OS command injection vulnerability within the Fluid project's JuicefsRuntime can potentially allow an authenticated user, who has the authority to create or update the K8s CRD Dataset/JuicefsRuntime, to execute arbitrary OS commands within the juicefs related containers. This could lead to unauthorized access, modification or deletion of data.
For users who're using version < 0.9.3 with JuicefsRuntime, upgrade to v0.9.3.
Are there any links users can visit to find out more?
Special thanks to the discovers of this issue:
Xiaozheng Zhang xiaozheng_zhang@outlook.com
{ "nvd_published_at": "2024-03-15T19:15:06Z", "cwe_ids": [ "CWE-78" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-03-15T16:35:11Z" }