Client Spoofing Affecting org.apache.drill.exec:drill-java-exec Open this link in a new tab package, versions [,1.12.0)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEDRILLEXEC-31593

  • published

    7 Dec 2017

  • disclosed

    17 Oct 2017

  • credit

    Unknown

Introduced: 17 Oct 2017

CWE-290 Open this link in a new tab

How to fix?

Upgrade org.apache.drill.exec:drill-java-exec to version 0.12.0 or higher

Overview

org.apache.drill.exec:drill-java-exec is a distributed MPP query layer that supports SQL and alternative query languages against NoSQL and Hadoop data storage systems.

Affected versions of the package are vulnerable to drillbit Client Spoofing. An attacker can spoof a drillbit client, which can lead to sensitive data being written to the attacker's target.