org.apache.cassandra:cassandra-all@3.11.6 vulnerabilities
-
latest version
4.1.4
-
latest non vulnerable version
-
first published
13 years ago
-
latest version published
3 months ago
-
licenses detected
- [0.7.0-rc4,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.cassandra:cassandra-all package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. Affected versions of this package are vulnerable to Arbitrary Code Injection. It is possible for an attacker to create a scripted UDF which executes arbitrary code on the server. This can be exploited with the following functions:
How to fix Arbitrary Code Injection? Upgrade |
[3.0.0-alpha1,3.0.26)
[3.11.0,3.11.12)
[4.0-alpha1,4.0.2)
|
org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). When using How to fix Man-in-the-Middle (MitM)? Upgrade |
[2.1.0,2.3.0)
[3.0.0,3.0.24)
[3.11.0,3.11.10)
|
org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). It is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely. How to fix Man-in-the-Middle (MitM)? Upgrade |
[2.1.0,2.1.22)
[2.2.0,2.2.18)
[3.0.0,3.0.22)
[3.11.0,3.11.8)
[4.0-alpha1,4.0-beta2)
|