[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] [CVE-2021-26919] Authenticated users can execute arbitrary code from malicious MySQL 
From:       Jihoon Son <jihoonson () apache ! org>
Date:       2021-03-29 19:19:36
Message-ID: CACZfFK7iNuZ33z5H7b8spJxGZhPyc51O-9zfRq-Cp4Cf-tTqTw () mail ! gmail ! com
[Download RAW message or body]

Severity: Medium

Vendor:
The Apache Software Foundation

Versions Affected:
Druid 0.20.1 and earlier

Description:
Druid allows users to read data from other database systems using
JDBC. This functionality is to allow trusted users with the proper
permissions to set up lookups or submit ingestion tasks. The MySQL
JDBC driver supports certain properties, which, if left unmitigated,
can allow an attacker to execute arbitrary code from a
hacker-controlled malicious MySQL server within Druid server
processes.

Mitigation:
Users should upgrade to Druid 0.20.2 and enable new Druid
configurations to mitigate vulnerable MySQL JDBC properties.
Whenever possible, network access to cluster machines should be
restricted to trusted hosts only.
Ensure that users have the minimum set of Druid permissions necessary,
and are not granted access to functionality that they do not require.

Credit:
This issue was discovered by fantasyC4t from the Ant FG Security Lab.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic