{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T06:39:04.048","vulnerabilities":[{"cve":{"id":"CVE-2024-27438","sourceIdentifier":"security@apache.org","published":"2024-03-21T10:15:08.370","lastModified":"2025-06-17T13:50:01.197","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Download of Code Without Integrity Check vulnerability in Apache Doris.\nThe jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution.\nOnce the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check.\nThis issue affects Apache Doris: from 1.2.0 through 2.0.4.\n\nUsers are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue."},{"lang":"es","value":"Descarga de Código Sin Integridad Check vulnerabilidad en Apache Doris. Los archivos del controlador jdbc utilizados para el catálogo JDBC no están verificados y pueden provocar la ejecución remota de comandos. Una vez que el atacante está autorizado a crear un catálogo JDBC, puede utilizar un archivo jar de controlador arbitrario con un fragmento de código no verificado. Este fragmento de código se ejecutará cuando el catálogo se inicialice sin ninguna verificación. Este problema afecta a Apache Doris: desde 1.2.0 hasta 2.0.4. Se recomienda a los usuarios actualizar a la versión 2.0.5 o 2.1.x, que soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-494"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*","versionStartIncluding":"1.2.0","versionEndExcluding":"2.0.5","matchCriteriaId":"6419B595-3483-47F6-8040-AB8A792253D8"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/03/21/1","source":"security@apache.org","tags":["Mailing List"]},{"url":"https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh","source":"security@apache.org","tags":["Mitigation"]},{"url":"http://www.openwall.com/lists/oss-security/2024/03/21/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://lists.apache.org/thread/h95h82b0svlnwcg6c2xq4b08j6gwgczh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation"]}]}}]}