Client Spoofing Affecting org.apache.drill.exec:drill-java-exec Open this link in a new tab package, versions [,1.12.0)
Attack Complexity
Low
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGAPACHEDRILLEXEC-31593
-
published
7 Dec 2017
-
disclosed
17 Oct 2017
-
credit
Unknown
Introduced: 17 Oct 2017
CWE-290 Open this link in a new tabHow to fix?
Upgrade org.apache.drill.exec:drill-java-exec
to version 0.12.0 or higher
Overview
org.apache.drill.exec:drill-java-exec
is a distributed MPP query layer that supports SQL and alternative query languages against NoSQL and Hadoop data storage systems.
Affected versions of the package are vulnerable to drillbit Client Spoofing. An attacker can spoof a drillbit client, which can lead to sensitive data being written to the attacker's target.