qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint. By manipulating the `name` parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as `/root/poc.txt`. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0.
References
Link | Resource |
---|---|
https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a | Patch |
https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73 | Exploit Third Party Advisory |
https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a | Patch |
https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73 | Exploit Third Party Advisory |
Configurations
History
10 Jul 2025, 18:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
10 Jul 2025, 17:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a - Patch | |
References | () https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73 - Exploit, Third Party Advisory | |
First Time |
Qdrant qdrant
Qdrant |
|
CPE | cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo |
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a - | |
References | () https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73 - |
30 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-30 13:15
Updated : 2025-07-10 18:21
NVD link : CVE-2024-3584
Mitre link : CVE-2024-3584
CVE.ORG link : CVE-2024-3584
JSON object : View
Products Affected
qdrant
- qdrant
CWE