Arbitrary Code Injection Affecting org.apache.cassandra:cassandra-all package, versions [3.0.0-alpha1, 3.0.26) [3.11.0, 3.11.12) [4.0-alpha1, 4.0.2)


0.0
high

Snyk CVSS

    Attack Complexity Low
    Privileges Required High
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 4.59% (93rd percentile)
Expand this section
NVD
9.1 critical
Expand this section
Red Hat
9.1 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGAPACHECASSANDRA-2400628
  • published 13 Feb 2022
  • disclosed 11 Feb 2022
  • credit Omer Kaspi

How to fix?

Upgrade org.apache.cassandra:cassandra-all to version 3.0.26, 3.11.12, 4.0.2 or higher.

Overview

org.apache.cassandra:cassandra-all is a maven plugin for the Apache Cassandra Project. Which, develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model.

Affected versions of this package are vulnerable to Arbitrary Code Injection. It is possible for an attacker to create a scripted UDF which executes arbitrary code on the server.

This can be exploited with the following functions: enable_user_defined_functions: true, enable_scripted_user_defined_functions: true, enable_user_defined_functions_threads: false