9.8
CVSSv3

CVE-2023-31039

Published: 08/05/2023 Updated: 12/05/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Security vulnerability in Apache bRPC <1.5.0 on all platforms allows malicious users to execute arbitrary code via ServerOptions::pid_file. An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process. Solution: 1. upgrade to bRPC >= 1.5.0, download link:  dist.apache.org/repos/dist/release/brpc/1.5.0/ dist.apache.org/repos/dist/release/brpc/1.5.0/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  github.com/apache/brpc/pull/2218 github.com/apache/brpc/pull/2218

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache brpc