org.apache.druid:druid-processing@28.0.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.druid:druid-processing package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Improper Input Validation

Affected versions of this package are vulnerable to Improper Input Validation when configuration a MySQL JDBC connection, which allows an attacker to use a crafted JDBC connection string to provide properties that are not on the properties allow list.

Note: This is only exploitable for users with the permission to configure JDBC connections.

How to fix Improper Input Validation?

Upgrade org.apache.druid:druid-processing to version 30.0.1 or higher.

[,30.0.1)
  • M
Improper Verification of Cryptographic Signature

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature through the manipulation of the pac4j session cookie. An attacker can decrypt and potentially alter encrypted messages by exploiting the padding oracle flaw.

Note: Druid installations not using the druid-pac4j extension are not affected by this vulnerability.

How to fix Improper Verification of Cryptographic Signature?

Upgrade org.apache.druid:druid-processing to version 30.0.1 or higher.

[0.18.0,30.0.1)