Arbitrary Code Execution Affecting org.apache.cassandra:cassandra-all package, versions [3.8,3.11.2)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.44% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHECASSANDRA-32397
  • published28 Jun 2018
  • disclosed28 Jun 2018
  • creditUnknown

Introduced: 28 Jun 2018

CVE-2018-8016  (opens in a new tab)
CWE-77  (opens in a new tab)

Overview

org.apache.cassandra:cassandra-all is a free and open-source distributed wide column store NoSQL database management system designed to handle large amounts of data across many commodity servers.

Affected versions of this package are vulnerable to Arbitrary Code Execution. The default configuration would bind an unauthenticated JMX/RMI interface to all network interfaces, which allowed remote attackers to execute arbitrary Java code via an RMI request.

Note: This issue is a regression of CVE-2015-0225.

References

Upgrade org.apache.cassandra:cassandra-all to version 3.11.2 or higher.

CVSS Scores

version 3.1