File and Directory Information Exposure Affecting trino package, versions <440-r0
Threat Intelligence
EPSS
0.16% (54th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-TRINO-6426731
- published 12 Mar 2024
- disclosed 7 Jan 2019
Introduced: 7 Jan 2019
CVE-2018-11798 Open this link in a new tabHow to fix?
Upgrade Wolfi
trino
to version 440-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream trino
package and not the trino
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
References
- http://www.securityfocus.com/bid/106501
- https://access.redhat.com/errata/RHSA-2019:1545
- https://access.redhat.com/errata/RHSA-2019:3140
- https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd%40%3Cuser.thrift.apache.org%3E