org.apache.cassandra:cassandra-all@3.0.23 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.cassandra:cassandra-all package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Injection

org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model.

Affected versions of this package are vulnerable to Arbitrary Code Injection. It is possible for an attacker to create a scripted UDF which executes arbitrary code on the server.

This can be exploited with the following functions: enable_user_defined_functions: true, enable_scripted_user_defined_functions: true, enable_user_defined_functions_threads: false

How to fix Arbitrary Code Injection?

Upgrade org.apache.cassandra:cassandra-all to version 3.0.26, 3.11.12, 4.0.2 or higher.

[3.0.0-alpha1,3.0.26) [3.11.0,3.11.12) [4.0-alpha1,4.0.2)
  • M
Man-in-the-Middle (MitM)

org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). When using dc or rack internode_encryption setting, a Cassandra instance allows both encrypted and unencrypted connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.apache.cassandra:cassandra-all to version 2.3.0, 3.0.24, 3.11.10 or higher.

[2.1.0,2.3.0) [3.0.0,3.0.24) [3.11.0,3.11.10)