This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Apache Polaris skips critical security checks when modifying `write.metadata.path`. <br>π₯ **Consequences**: Attackers can force metadata writes to unauthorized storage locations.β¦
π‘οΈ **CWE**: CWE-863 (Incomplete External Control of Path). <br>π **Flaw**: The code path for `ALTER TABLE`-style updates to `write.metadata.path` bypasses the storage location re-validation step.β¦
βοΈ **Threshold**: **Medium**. <br>π **Auth**: Needs user-level access to change table properties. <br>βοΈ **Config**: Exploitation is easier if `allow.unstructured.table.location=true` and `allowedLocations` is wide.β¦