Critical

qdrant

Arbitrary File Read and Write via Snapshot Recovery

This vulnerability allows for arbitrary file read and write during the snapshot recovery process in qdrant/qdrant version 1.9.0-dev. It was patched in version 1.9.0. The issue arises from improper handling of symlinks within snapshot files, enabling attackers to manipulate the recovery process to access or modify files on the server.

Available publicly on Jun 03 2024

9.8

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Credit:

ozelis
Remediation Steps
  • Ensure your qdrant instance is updated to version 1.9.0 or later.
  • Review and restrict access controls for uploading snapshots to trusted users only.
  • Regularly audit and monitor snapshot uploads and recovery operations for unusual activity.
  • Consider implementing additional input validation or sanitization to reject snapshots containing symlinks.
Patch Details
  • Fixed Version: v1.9.0
  • Patch Commit: https://github.com/qdrant/qdrant/commit/ee7a31ec3459a6a4219200234615c1817ab82260
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.