Digdag is an open source tool that to build, run, schedule, and monitor complex pipelines of tasks across various platforms. Treasure Data's digdag workload automation system is susceptible to a path traversal vulnerability if it's configured to store log files locally. This issue may lead to information disclosure and has been addressed in release version 0.10.5.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
History
21 Oct 2024, 20:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Treasuredata
Treasuredata digdag |
|
CPE | cpe:2.3:a:treasuredata:digdag:*:*:*:*:*:*:*:* | |
References | () https://github.com/treasure-data/digdag/commit/eae89b0daf6c62f12309d8c7194454dfb18cc5c3 - Patch | |
References | () https://github.com/treasure-data/digdag/security/advisories/GHSA-5mp4-32rr-v3x5 - Vendor Advisory | |
Summary |
|
14 Feb 2024, 13:59
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-14 03:15
Updated : 2024-10-21 20:09
NVD link : CVE-2024-25125
Mitre link : CVE-2024-25125
CVE.ORG link : CVE-2024-25125
JSON object : View
Products Affected
treasuredata
- digdag
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')