Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2207 | qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint. By manipulating the `name` parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as `/root/poc.txt`. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0. |
Github GHSA |
GHSA-xcr2-h8hv-6227 | qdrant is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 10 Jul 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qdrant
Qdrant qdrant |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qdrant
Qdrant qdrant |
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:12:07.892Z
Reserved: 2024-04-10T14:03:16.284Z
Link: CVE-2024-3584
Updated: 2024-08-01T20:12:07.892Z
Status : Analyzed
Published: 2024-05-30T13:15:49.947
Modified: 2025-07-10T18:21:56.083
Link: CVE-2024-3584
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA