CVE-2023-31039

Apache bRPC: ServerOptions.pid_file may cause arbitrary code execution

Description

Security vulnerability in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file. An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process. Solution: 1. upgrade to bRPC >= 1.5.0, download link:  https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218

Remediation

Workaround:

  • Apply this patch:  https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.24%
Vendor Advisory apache.org
Affected: Apache Software Foundation Apache bRPC
Published at:
Updated at:

References

Link Tags
https://lists.apache.org/thread/jqpttrqbc38yhckgp67xk399hqxnz7jn patch vendor advisory mailing list
http://www.openwall.com/lists/oss-security/2023/05/08/1 patch mailing list third party advisory

Frequently Asked Questions

What is the severity of CVE-2023-31039?
CVE-2023-31039 has been scored as a critical severity vulnerability.
How to fix CVE-2023-31039?
As a workaround for remediating CVE-2023-31039: Apply this patch:  https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218
Is CVE-2023-31039 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-31039 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-31039?
CVE-2023-31039 affects Apache Software Foundation Apache bRPC.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.