AVID-2026-R1488
Description
Path Traversal in qdrant/qdrant (CVE-2024-3584)
Details
qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the /collections/{name}/snapshots/upload endpoint. By manipulating the name parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as /root/poc.txt. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0.
Reason for inclusion in AVID: CVE-2024-3584 describes a path traversal vulnerability in qdrant/qdrant that allows arbitrary file write on the server, a critical security flaw in a software component commonly used to support AI pipelines (vector search/embedding storage). This is a software supply-chain-relevant issue affecting components used to build/deploy AI systems. The report provides explicit vulnerability details (unvalidated input, write to arbitrary path) and references a fix, satisfying criteria for AI-related, supply-chain, and security/vulnerability evidence.
References
- NVD entry
- https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73
- https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a
Affected or Relevant Artifacts
- Developer: qdrant
- Deployer: qdrant
- Artifact Details:
| Type | Name |
|---|---|
| System | qdrant/qdrant |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Base Score | 9.8 |
| Base Severity | 🔴 Critical |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-20 | CWE-20 Improper Input Validation |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-05-30
- Version: 0.3.3
- AVID Entry