CVE-2024-2221
Qdrant vulnerability analysis and mitigation

Overview

CVE-2024-2221 affects qdrant/qdrant software and was disclosed on April 10, 2024. The vulnerability is a path traversal and arbitrary file upload vulnerability that exists in the /collections/{COLLECTION}/snapshots/upload endpoint, specifically through the snapshot parameter (NVD).

Technical details

The vulnerability allows attackers to upload and overwrite any file on the filesystem through path traversal via the /collections/{COLLECTION}/snapshots/upload endpoint. The issue specifically involves improper validation of the snapshot parameter. The vulnerability has been assigned a CVSS v3.0 base score of 9.8 (CRITICAL) with vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity across confidentiality, integrity, and availability impacts (NVD).

Impact

The vulnerability affects the integrity and availability of the system by enabling unauthorized access and potentially causing server malfunction. Successful exploitation could lead to remote code execution through arbitrary file upload and overwrite capabilities on the filesystem (NVD).

Mitigation and workarounds

A fix has been implemented and can be found in the repository commit (Github Commit). Users should update to the patched version to mitigate this vulnerability.

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management