In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E | Broken Link |
https://seclists.org/oss-sec/2020/q2/112 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-05-14 17:15
Updated : 2024-02-04 21:00
NVD link : CVE-2019-17572
Mitre link : CVE-2019-17572
CVE.ORG link : CVE-2019-17572
JSON object : View
Products Affected
apache
- rocketmq
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')