7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Apache cassandra is vulnerable to remote code execution. The vulnerability exists due to the use of a default JMX configuration of unauthenticated JMX/RMI interface to all network interfaces. Therefore, anyone with access to the interface is allowed to listen to the RMI and to trigger a remote execution of serialized Java.
CPE | Name | Operator | Version |
---|---|---|---|
apache cassandra | le | 1.2.19 | |
apache cassandra | le | 2.1.3 | |
apache cassandra | le | 2.0.13 | |
apache cassandra | le | 1.2.19 | |
apache cassandra | le | 2.1.3 | |
apache cassandra | le | 2.0.13 |
packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html
rhn.redhat.com/errata/RHSA-2015-1947.html
www.mail-archive.com/[email protected]/msg41819.html
www.securityfocus.com/archive/1/535154/100/0/threaded
www.securityfocus.com/bid/73478
www.securitytracker.com/id/1034002
bugzilla.redhat.com/show_bug.cgi?id=1208181