Description
qdrant/qdrant is vulnerable to a path traversal and arbitrary file upload vulnerability via the `/collections/{COLLECTION}/snapshots/upload` endpoint, specifically through the `snapshot` parameter. This vulnerability allows attackers to upload and overwrite any file on the filesystem, leading to potential remote code execution. This issue affects the integrity and availability of the system, enabling unauthorized access and potentially causing the server to malfunction.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/6be8d4e3-67e6-4660-a8db-04215a1cff3e
Scores
CVSS v3
9.8
EPSS
0.2553
EPSS Percentile
96.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-22
CWE-434
Status
published
Products (1)
qdrant/qdrant
1.7.4
Published
Apr 10, 2024
Tracked Since
Feb 18, 2026