Lucene search

K
freebsdFreeBSD60624F63-9180-11ED-ACBE-B42E991FC52E
HistoryFeb 11, 2022 - 12:00 a.m.

cassandra3 -- arbitrary code execution

2022-02-1100:00:00
vuxml.freebsd.org
13

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.046 Low

EPSS

Percentile

92.5%

Marcus Eriksson reports:

  When running Apache Cassandra with
  the following configuration:
  enable_user_defined_functions: true
  enable_scripted_user_defined_functions: true
  enable_user_defined_functions_threads: false
  it is possible for an attacker to execute arbitrary code on
  the host. The attacker would need to have enough permissions
  to create user defined functions in the cluster to be able
  to exploit this.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchcassandra3< 3.11.13UNKNOWN

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.046 Low

EPSS

Percentile

92.5%