|
Message-ID: <CACZfFK7iNuZ33z5H7b8spJxGZhPyc51O-9zfRq-Cp4Cf-tTqTw@mail.gmail.com> Date: Mon, 29 Mar 2021 12:19:36 -0700 From: Jihoon Son <jihoonson@...che.org> To: oss-security@...ts.openwall.com Subject: [CVE-2021-26919] Authenticated users can execute arbitrary code from malicious MySQL database systems Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Druid 0.20.1 and earlier Description: Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. Mitigation: Users should upgrade to Druid 0.20.2 and enable new Druid configurations to mitigate vulnerable MySQL JDBC properties. Whenever possible, network access to cluster machines should be restricted to trusted hosts only. Ensure that users have the minimum set of Druid permissions necessary, and are not granted access to functionality that they do not require. Credit: This issue was discovered by fantasyC4t from the Ant FG Security Lab.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.