| 概要 | In plain terms, Apache Polaris is supposed to issue short-lived GCS credentials Apache Polaris builds Google Cloud Storage downscoped credentials by creating a The relevant CEL string is built from the bucket name and the table path. As a result, a namespace or table identifier containing a single quote and In private testing against Polaris 1.4.0 on real Google Cloud Storage, it was confirmed that Polaris accepted a crafted identifier and returned delegated Those delegated credentials could then: - list another table's object prefix; - read another table's metadata control file (Iceberg metadata JSON); - create and delete an object under another table's object prefix; - and also list, read, create, and delete objects under an unrelated That last point is important. The issue is not limited to "another table". The practical effect is that temporary credentials for one crafted table The current GCS testing used a Polaris principal with broad catalog |
|---|---|
| 公表日 | 2026年5月5日2:16 |
| 登録日 | 2026年5月5日4:07 |
| 最終更新日 | 2026年5月5日2:16 |
| CVSS3.1 : CRITICAL | |
| スコア | 9.9 |
|---|---|
| ベクター | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更あり |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |