Vulnerability Description
Fluid is an open source Kubernetes-native Distributed Dataset Orchestrator and Accelerator for data-intensive applications. An OS command injection vulnerability within the Fluid project's JuicefsRuntime can potentially allow an authenticated user, who has the authority to create or update the K8s CRD Dataset/JuicefsRuntime, to execute arbitrary OS commands within the juicefs related containers. This could lead to unauthorized access, modification or deletion of data. Users who're using versions < 0.9.3 with JuicefsRuntime should upgrade to v0.9.3.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Fluid | < 0.9.3 |
Related Weaknesses (CWE)
References
- https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7fPatch
- https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rjVendor Advisory
- https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7fPatch
- https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rjVendor Advisory
FAQ
What is CVE-2023-51699?
CVE-2023-51699 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Fluid is an open source Kubernetes-native Distributed Dataset Orchestrator and Accelerator for data-intensive applications. An OS command injection vulnerability within the Fluid project's JuicefsRunt...
How severe is CVE-2023-51699?
CVE-2023-51699 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-51699?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Fluid.