You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@rocketmq.apache.org by ShannonDing <di...@apache.org> on 2020/05/14 07:05:41 UTC

[SECURITY][CVE-2019-17572] Apache RocketMQ directory traversal vulnerability

Hi, 
An directory traversal vulnerability[1] was discovered in the version RocketMQ 4.6.0 and it affect all
versions earlier. And it was fixed in the version 4.6.1 and later according to the CVE-2019-17572.
Here is the detail of the vulnerability below:


[CVEID]:CVE-2019-17572
[PRODUCT]:Apache RocketMQ
[VERSIONS]:Apache RocketMQ 4.2.0 to 4.6.0
[PROBLEMTYPE]: Directory traversal vulnerability
[REFERENCES]:https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E
[DESCRIPTION]:When the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker,  a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability.
[MITIGATION]: Users of the affected versions should apply one of the following:
mitigations:
- Upgrade to Apache RocketMQ 4.6.1or later


[1] https://github.com/apache/rocketmq/issues/1637