Client Spoofing Affecting org.apache.drill.exec:drill-java-exec package, versions [,1.12.0)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHEDRILLEXEC-31593
- published 7 Dec 2017
- disclosed 17 Oct 2017
- credit Unknown
How to fix?
Upgrade org.apache.drill.exec:drill-java-exec to version 0.12.0 or higher
Overview
org.apache.drill.exec:drill-java-exec is a distributed MPP query layer that supports SQL and alternative query languages against NoSQL and Hadoop data storage systems.
Affected versions of the package are vulnerable to drillbit Client Spoofing. An attacker can spoof a drillbit client, which can lead to sensitive data being written to the attacker's target.
References
CVSS Scores
version 3.1