Fluid is an open source Kubernetes-native Distributed Dataset Orchestrator and Accelerator for data-intensive applications. An OS command injection vulnerability within the Fluid project's JuicefsRuntime can potentially allow an authenticated user, who has the authority to create or update the K8s CRD Dataset/JuicefsRuntime, to execute arbitrary OS commands within the juicefs related containers. This could lead to unauthorized access, modification or deletion of data. Users who're using versions < 0.9.3 with JuicefsRuntime should upgrade to v0.9.3.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1030 Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime
Github GHSA Github GHSA GHSA-wx8q-4gm9-rj2g Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 09 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation fluid
CPEs cpe:2.3:a:linuxfoundation:fluid:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation fluid

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T22:40:34.213Z

Reserved: 2023-12-21T21:32:12.991Z

Link: CVE-2023-51699

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:34.213Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-15T19:15:06.810

Modified: 2025-04-09T15:33:17.013

Link: CVE-2023-51699

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.