logo

CVE-2021-26919 org.apache.druid:druid

Package

Manager: maven
Name: org.apache.druid:druid
Vulnerable Version: >=0 <0.20.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.82388 pctl0.99182

Details

Arbitrary code execution in Apache Druid Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2

Metadata

Created: 2021-06-16T17:51:58Z
Modified: 2022-06-06T18:06:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-jj4f-p7vv-j4v9/GHSA-jj4f-p7vv-j4v9.json
CWE IDs: ["CWE-668"]
Alternative ID: GHSA-jj4f-p7vv-j4v9
Finding: F017
Auto approve: 1