Lucene search

K
cnvdChina National Vulnerability DatabaseCNVD-2021-89547
HistoryNov 19, 2021 - 12:00 a.m.

Apache Druid LoadData has an arbitrary file reading vulnerability

2021-11-1900:00:00
China National Vulnerability Database
www.cnvd.org.cn
8

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

A security vulnerability exists in Apache Druid, a column-oriented open source distributed database written in Java by the Apache Foundation, which stems from the fact that InputSource is used to read data from a data source in the Druid ingestion system. However, the HTTP InputSource allows an authenticated user to read data from other sources, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privileges when the user accesses Druid directly, as Druid also provides Local InputSource, which allows the same level of access. But this is problematic when the user interacts with Druid indirectly through an application that allows the user to specify an HTTP InputSource instead of a Local InputSource. In this case, a user can bypass the application-level restrictions by passing the file URL to the HTTP InputSource. No details of the vulnerability are currently available.

CPENameOperatorVersion
apache druidlt0.22.0

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N