Apache bRPC: ServerOptions.pid_file may cause arbitrary code execution
CVE-2023-31039
9.8CRITICAL
Summary
A security vulnerability exists in Apache bRPC versions below 1.5.0, where an attacker can manipulate the ServerOptions::pid_file parameter to execute arbitrary code with the privileges of the bRPC process. This flaw poses significant security risks for applications utilizing the affected software. It is recommended to update to bRPC version 1.5.0 or later to mitigate this risk. For those unable to upgrade, applying the provided patch can offer temporary relief against potential exploitation.
Affected Version(s)
Apache bRPC 0.9.0 < 1.5.0
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved