Arbitrary Command Injection Affecting org.apache.cassandra:cassandra-all package, versions [1.2.0,1.2.19][2.0.0,2.0.13][2.1.0,2.1.3]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.57% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHECASSANDRA-30007
  • published1 Apr 2015
  • disclosed1 Apr 2015
  • creditUnknown

Introduced: 1 Apr 2015

CVE-2015-0225  (opens in a new tab)
CWE-77  (opens in a new tab)

Overview

org.apache.cassandra:cassandra-all is a free and open-source distributed wide column store NoSQL database management system designed to handle large amounts of data across many commodity servers.

Affected versions of this package are vulnerable to Arbitrary Code Execution. The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.

References

CVSS Scores

version 3.1