qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint. By manipulating the `name` parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as `/root/poc.txt`. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00355}

epss

{'score': 0.00267}


Thu, 10 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Thu, 10 Jul 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Qdrant
Qdrant qdrant
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:*
Vendors & Products Qdrant
Qdrant qdrant

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T20:12:07.892Z

Reserved: 2024-04-10T14:03:16.284Z

Link: CVE-2024-3584

cve-icon Vulnrichment

Updated: 2024-08-01T20:12:07.892Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-30T13:15:49.947

Modified: 2025-07-10T18:21:56.083

Link: CVE-2024-3584

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.