SB2022011111 - Debian update for sphinxsearch
Published: January 11, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) Path traversal (CVE-ID: CVE-2020-29050)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences, because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). A remote user can send a specially crafted HTTP request and read arbitrary files on the system.
Please note, the affected version does not require authentication by default (see vulnerability #VU59363) and therefore the vulnerability can be exploited by a remote non-authenticated attacker in the default configuration.
Remediation
Install update from vendor's website.