Lucene search

K
hiveproHive ProHIVEPRO:0C090DEF92788A05D308C7C5B91085AB
HistoryFeb 18, 2022 - 12:40 p.m.

Apache Cassandra database affected by easily exploitable Remote code execution

2022-02-1812:40:54
Hive Pro
www.hivepro.com
37

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

THREAT LEVEL: Amber. For a detailed advisory, download the pdf file here Apache Cassandra is a database software being used by many companies such as Uber, Facebook, Netflix, Twitter, Instagram, Spotify, Instacart, Reddit, and Accenture. A remote code execution flaw (CVE-2021-44521) is reported which is easily exploitable and has the potential to wreak havoc on systems. This vulnerability affects the Apache Cassandra instances that have the following non-default configuration settings: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false An attacker with sufficient permissions to construct user defined functions in the cluster might use these setups to execute arbitrary code on the host system. This vulnerability could be easily mitigated by either setting 'enable_user_defined_functions_threads: true', or upgrading versions 3.0.x to 3.0.26, 3.11.x to 3.11.12 or 4.0.x to 4.0.2 Potential MITRE ATT&CK TTPs are: TA0001: Initial Access TA0002: Execution T1190: Exploit-public facing application T1059: Command and Scripting Interpreter T1059.007: Command and Scripting Interpreter: JavaScript Vulnerability Details Patch Link https://www.apache.org/dyn/closer.lua/cassandra/4.0.3/apache-cassandra-4.0.3-bin.tar.gz https://www.apache.org/dyn/closer.lua/cassandra/3.11.12/apache-cassandra-3.11.12-bin.tar.gz https://www.apache.org/dyn/closer.lua/cassandra/3.0.26/apache-cassandra-3.0.26-bin.tar.gz References https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356 https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C