Path traversal in Sphinx - CVE-2020-29050

 

Path traversal in Sphinx - CVE-2020-29050

Published: January 11, 2022


Vulnerability identifier: #VU59364
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-29050
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Sphinx
Software vendor:
Sphinx Technologies

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences, because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). A remote user can send a specially crafted HTTP request and read arbitrary files on the system.

Please note, the affected version does not require authentication by default (see vulnerability #VU59363) and therefore the vulnerability can be exploited by a remote non-authenticated attacker in the default configuration.


Remediation

Install update from vendor's website.

External links