SB2022011110 - Path traversal in Sphinx



SB2022011110 - Path traversal in Sphinx

Published: January 11, 2022

Security Bulletin ID SB2022011110
CSH Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) Path traversal (CVE-ID: CVE-2020-29050)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences, because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). A remote user can send a specially crafted HTTP request and read arbitrary files on the system.

Please note, the affected version does not require authentication by default (see vulnerability #VU59363) and therefore the vulnerability can be exploited by a remote non-authenticated attacker in the default configuration.


Remediation

Install update from vendor's website.