Vulnerability Details CVE-2024-3078
A vulnerability was found in Qdrant up to 1.6.1/1.7.4/1.8.2 and classified as critical. This issue affects some unknown processing of the file lib/collection/src/collection/snapshots.rs of the component Full Snapshot REST API. The manipulation leads to path traversal. Upgrading to version 1.8.3 is able to address this issue. The patch is named 3ab5172e9c8f14fa1f7b24e7147eac74e2412b62. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-258611.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.3%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 5.2
Products affected by CVE-2024-3078
-
cpe:2.3:a:qdrant:qdrant:0.10.0
-
cpe:2.3:a:qdrant:qdrant:0.10.1
-
cpe:2.3:a:qdrant:qdrant:0.10.2
-
cpe:2.3:a:qdrant:qdrant:0.10.3
-
cpe:2.3:a:qdrant:qdrant:0.10.4
-
cpe:2.3:a:qdrant:qdrant:0.10.5
-
cpe:2.3:a:qdrant:qdrant:0.11.0
-
cpe:2.3:a:qdrant:qdrant:0.11.1
-
cpe:2.3:a:qdrant:qdrant:0.11.2
-
cpe:2.3:a:qdrant:qdrant:0.11.3
-
cpe:2.3:a:qdrant:qdrant:0.11.4
-
cpe:2.3:a:qdrant:qdrant:0.11.5
-
cpe:2.3:a:qdrant:qdrant:0.11.6
-
cpe:2.3:a:qdrant:qdrant:0.11.7
-
cpe:2.3:a:qdrant:qdrant:0.2.0
-
cpe:2.3:a:qdrant:qdrant:0.2.1
-
cpe:2.3:a:qdrant:qdrant:0.3.0
-
cpe:2.3:a:qdrant:qdrant:0.3.1
-
cpe:2.3:a:qdrant:qdrant:0.3.2
-
cpe:2.3:a:qdrant:qdrant:0.3.4
-
cpe:2.3:a:qdrant:qdrant:0.3.5
-
cpe:2.3:a:qdrant:qdrant:0.3.6
-
cpe:2.3:a:qdrant:qdrant:0.4.0
-
cpe:2.3:a:qdrant:qdrant:0.4.1
-
cpe:2.3:a:qdrant:qdrant:0.4.2
-
cpe:2.3:a:qdrant:qdrant:0.5.0
-
cpe:2.3:a:qdrant:qdrant:0.5.1
-
cpe:2.3:a:qdrant:qdrant:0.6.0
-
cpe:2.3:a:qdrant:qdrant:0.7.0
-
cpe:2.3:a:qdrant:qdrant:0.8.0
-
cpe:2.3:a:qdrant:qdrant:0.8.1
-
cpe:2.3:a:qdrant:qdrant:0.8.2
-
cpe:2.3:a:qdrant:qdrant:0.8.3
-
cpe:2.3:a:qdrant:qdrant:0.8.4
-
cpe:2.3:a:qdrant:qdrant:0.8.5
-
cpe:2.3:a:qdrant:qdrant:0.8.6
-
cpe:2.3:a:qdrant:qdrant:0.9.0
-
cpe:2.3:a:qdrant:qdrant:0.9.1
-
cpe:2.3:a:qdrant:qdrant:1.0.0
-
cpe:2.3:a:qdrant:qdrant:1.0.1
-
cpe:2.3:a:qdrant:qdrant:1.0.2
-
cpe:2.3:a:qdrant:qdrant:1.0.3
-
cpe:2.3:a:qdrant:qdrant:1.1.0
-
cpe:2.3:a:qdrant:qdrant:1.1.1
-
cpe:2.3:a:qdrant:qdrant:1.1.2
-
cpe:2.3:a:qdrant:qdrant:1.1.3
-
cpe:2.3:a:qdrant:qdrant:1.2.0
-
cpe:2.3:a:qdrant:qdrant:1.2.1
-
cpe:2.3:a:qdrant:qdrant:1.2.2
-
cpe:2.3:a:qdrant:qdrant:1.3.0
-
cpe:2.3:a:qdrant:qdrant:1.3.1
-
cpe:2.3:a:qdrant:qdrant:1.3.2
-
cpe:2.3:a:qdrant:qdrant:1.4.0
-
cpe:2.3:a:qdrant:qdrant:1.4.1
-
cpe:2.3:a:qdrant:qdrant:1.5.0
-
cpe:2.3:a:qdrant:qdrant:1.5.1
-
cpe:2.3:a:qdrant:qdrant:1.6.0
-
cpe:2.3:a:qdrant:qdrant:1.6.1
-
cpe:2.3:a:qdrant:qdrant:1.7.0
-
cpe:2.3:a:qdrant:qdrant:1.7.1
-
cpe:2.3:a:qdrant:qdrant:1.7.2
-
cpe:2.3:a:qdrant:qdrant:1.7.3
-
cpe:2.3:a:qdrant:qdrant:1.7.4
-
cpe:2.3:a:qdrant:qdrant:1.8.0
-
cpe:2.3:a:qdrant:qdrant:1.8.1
-
cpe:2.3:a:qdrant:qdrant:1.8.2