目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-42812— Apache Polaris write.metadata.path 无保护漏洞

CVSS 9.9 · Critical EPSS 0.06% · P18
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-42812 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Apache Polaris: No protection on `write.metadata.path`
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In Apache Iceberg, the table's metadata files are control files: they tell readers which data files belong to the table and which table version to read. `write.metadata.path` is an optional table property that tells Polaris where to write those metadata files. For a table already registered in a Polaris-managed catalog, changing only that property through an `ALTER TABLE`-style settings change (not a row-level `INSERT`, `SELECT`, `UPDATE`, or `DELETE`) bypasses the commit-time branch that is supposed to revalidate storage locations. The full persisted / credential-vending variant requires the affected catalog to have `polaris.config.allow.unstructured.table.location=true`, with `allowedLocations` broad enough to include the attacker-chosen target. `allowedLocations` is the admin-configured allowlist of storage paths that the catalog is allowed to use. Public project materials suggest that this flag is a real supported compatibility / layout mode, not just a contrived lab-only prerequisite. In that configuration, a user who can change table settings can cause Apache Polaris itself to write new table metadata to an attacker-chosen reachable storage location before the intended location-validation branch runs. If the later concrete-path validation also accepts that location, Polaris persists the resulting metadata path into stored table state. Later table-load and credential APIs can then return temporary cloud-storage credentials for the same location without revalidating it. In plain terms, Polaris can later hand out temporary storage access for the same attacker-chosen area. That attacker-chosen area does not need to be limited to the poisoned table's own files. If it is a broader storage prefix, another table's prefix, or, depending on configuration or provider behavior, even a bucket/container root, the resulting disclosure or corruption scope can extend to any data and metadata Polaris can reach there. The practical consequences are therefore similar to the staged-create credential-vending issue already discussed: data and metadata reachable in that storage scope can be exposed and, if write-capable credentials are later issued, modified, corrupted, or removed. Even before that later credential step, Polaris itself performs the metadata write to the unchecked location. So the core issue is not only later credential vending. The primary defect is that Polaris skips its intended location checks before performing a security- sensitive metadata write when only `write.metadata.path` changes. When `polaris.config.allow.unstructured.table.location=false`, current code review suggests the later `updateTableLike(...)` validation usually rejects out-of-tree metadata locations before the unsafe path is persisted. That may reduce the persisted / credential-vending variant, but it does not prevent the underlying defect: Polaris still skips the intended pre-write location check when only `write.metadata.path` changes.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
授权机制不正确
来源: 美国国家漏洞数据库 NVD

神龙十问 — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

受影响产品

厂商产品影响版本CPE订阅
Apache Software FoundationApache Polaris 0 ~ 1.4.1 -

二、漏洞 CVE-2026-42812 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-42812 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · Apache Software Foundation · 2026-05-04 · 共 17 条

CVE-2026-428109.9 CRITICALApache Polaris 通配符命名空间凭证泄露漏洞
CVE-2026-428119.9 CRITICALApache Polaris GCS凭证泄露漏洞
CVE-2026-428099.9 CRITICALApache Polaris 临时存储凭证滥用漏洞
CVE-2026-40682Apache OpenNLP 字典解析 XXE 漏洞
CVE-2026-42027Apache OpenNLP 扩展加载器任意类实例化漏洞
CVE-2026-42440Apache OpenNLP 内存溢出拒绝服务漏洞
CVE-2026-40563Apache Atlas 脚本注入漏洞
CVE-2026-29169Apache HTTP Server mod_dav_lock 间接锁定崩溃漏洞
CVE-2026-23918Apache HTTP Server http2 早期重置双释放及RCE漏洞
CVE-2026-33006Apache HTTP Server mod_auth_digest 时序攻击漏洞
CVE-2026-33007Apache HTTP Server mod_authn_socache 崩溃漏洞
CVE-2026-33523Apache HTTP Server HTTP响应拆分漏洞
CVE-2026-33857Apache HTTP Server AJP获取函数边界外读漏洞
CVE-2026-34032Apache HTTP Server mod_proxy_ajp堆缓冲区过读漏洞
CVE-2026-34059Apache HTTP Server mod_proxy_ajp堆溢出与内存泄露漏洞
CVE-2026-24072Apache HTTP Server mod_rewrite 权限提升漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-42812

暂无评论


发表评论