5.0.2
14 years ago
4 months ago
Known vulnerabilities in the org.apache.cassandra:cassandra-all package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. Affected versions of this package are vulnerable to Privilege Defined With Unsafe Actions in How to fix Privilege Defined With Unsafe Actions? Upgrade | [3.0.0,3.0.31)[3.1,3.11.18)[4.0-alpha1,4.0.16)[4.1-alpha1,4.1.8)[5.0-alpha1,5.0.3) |
org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. Affected versions of this package are vulnerable to Incorrect Authorization in How to fix Incorrect Authorization? Upgrade | [4.0.0,4.0.16)[4.1-alpha1,4.1.8)[5.0-alpha1,5.0.3) |
org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). It is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorized operations. Note: This vulnerability only affects applications running on Java 11. It is the same vulnerability as the one described in CVE-2020-13946 for prior Java versions. How to fix Man-in-the-Middle (MitM)? Upgrade | [4.0.2,4.0.15)[4.1-alpha1,4.1.8)[5.0-alpha1,5.0.3) |