Lucene search

K
cveApacheCVE-2024-45537
HistorySep 17, 2024 - 7:15 p.m.

CVE-2024-45537

2024-09-1719:15:28
CWE-20
apache
web.nvd.nist.gov
27
apache druid
jdbc
data reading
trusted users
allowed properties restrictions

AI Score

5.8

Confidence

High

EPSS

0.012

Percentile

85.7%

Apache Druid allows users with certain permissions to read data from other database systems using JDBC. This functionality allows trusted users to set up Druid lookups or run ingestion tasks. Druid also allows administrators to configure a list of allowed properties that users are able to provide for their JDBC connections. By default, this allowed properties list restricts users to TLS-related properties only. However, when configuration a MySQL JDBC connection, users can use a particularly-crafted JDBC connection string to provide properties that are not on this allow list.

Users without the permission to configure JDBC connections are not able to exploit this vulnerability.
CVE-2021-26919 describes a similar vulnerability which was partially addressed in Apache Druid 0.20.2.

This issue is fixed in Apache Druid 30.0.1.

Affected configurations

Vulners
Node
apachedruidRange30.0.0
VendorProductVersionCPE
apachedruid*cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "collectionURL": "https://repo.maven.apache.org/maven2",
    "defaultStatus": "unaffected",
    "packageName": "org.apache.druid.extensions:druid-lookups-cached-global",
    "product": "Apache Druid",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "30.0.0",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

AI Score

5.8

Confidence

High

EPSS

0.012

Percentile

85.7%