CVE-2021-26919 – org.apache.druid:druid
Package
Manager: maven
Name: org.apache.druid:druid
Vulnerable Version: >=0 <0.20.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.82388 pctl0.99182
Details
Arbitrary code execution in Apache Druid Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
Metadata
Created: 2021-06-16T17:51:58Z
Modified: 2022-06-06T18:06:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-jj4f-p7vv-j4v9/GHSA-jj4f-p7vv-j4v9.json
CWE IDs: ["CWE-668"]
Alternative ID: GHSA-jj4f-p7vv-j4v9
Finding: F017
Auto approve: 1