Fluid is an open source Kubernetes-native Distributed Dataset Orchestrator and Accelerator for data-intensive applications. An OS command injection vulnerability within the Fluid project's JuicefsRuntime can potentially allow an authenticated user, who has the authority to create or update the K8s CRD Dataset/JuicefsRuntime, to execute arbitrary OS commands within the juicefs related containers. This could lead to unauthorized access, modification or deletion of data. Users who're using versions < 0.9.3 with JuicefsRuntime should upgrade to v0.9.3.
References
Configurations
History
09 Apr 2025, 15:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linuxfoundation
Linuxfoundation fluid |
|
CPE | cpe:2.3:a:linuxfoundation:fluid:*:*:*:*:*:*:*:* | |
References | () https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7f544fad7d66 - Patch | |
References | () https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rj2g - Vendor Advisory |
Information
Published : 2024-03-15 19:15
Updated : 2025-04-09 15:33
NVD link : CVE-2023-51699
Mitre link : CVE-2023-51699
CVE.ORG link : CVE-2023-51699
JSON object : View
Products Affected
linuxfoundation
- fluid
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')