|
Message-ID: <6ce2cc1a-3308-19a3-91d5-b5457ed6f2f5@apache.org> Date: Fri, 11 Feb 2022 10:01:38 +0000 From: Marcus Eriksson <marcuse@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2021-44521: Apache Cassandra: Remote code execution for scripted UDFs Severity: high Description: When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE. This issue is being tracked as CASSANDRA-17352 Mitigation: Set `enable_user_defined_functions_threads: true` (this is default) or 3.0 users should upgrade to 3.0.26 3.11 users should upgrade to 3.11.12 4.0 users should upgrade to 4.0.2 Credit: This issue was discovered by Omer Kaspi of the JFrog Security vulnerability research team.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.