Apache bRPC: ServerOptions.pid_file may cause arbitrary code execution
CVE-2023-31039

9.8CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
8 May 2023

Summary

A security vulnerability exists in Apache bRPC versions below 1.5.0, where an attacker can manipulate the ServerOptions::pid_file parameter to execute arbitrary code with the privileges of the bRPC process. This flaw poses significant security risks for applications utilizing the affected software. It is recommended to update to bRPC version 1.5.0 or later to mitigate this risk. For those unable to upgrade, applying the provided patch can offer temporary relief against potential exploitation.

Affected Version(s)

Apache bRPC 0.9.0 < 1.5.0

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.