GHSA-jj4f-p7vv-j4v9

Suggest an improvement
Source
https://github.com/advisories/GHSA-jj4f-p7vv-j4v9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-jj4f-p7vv-j4v9/GHSA-jj4f-p7vv-j4v9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jj4f-p7vv-j4v9
Aliases
Published
2021-06-16T17:51:58Z
Modified
2023-11-08T04:05:22.525813Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Arbitrary code execution in Apache Druid
Details

Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2

Database specific
{
    "nvd_published_at": "2021-03-30T08:15:00Z",
    "github_reviewed_at": "2021-03-31T20:50:36Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-668"
    ]
}
References

Affected packages

Maven / org.apache.druid:druid

Package

Name
org.apache.druid:druid
View open source insights on deps.dev
Purl
pkg:maven/org.apache.druid/druid

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20.2

Affected versions

0.*

0.13.0-incubating
0.14.0-incubating
0.14.1-incubating
0.14.2-incubating
0.15.0-incubating
0.15.1-incubating
0.16.0-incubating
0.16.1-incubating
0.17.0
0.17.1
0.18.0
0.18.1
0.19.0
0.20.0
0.20.1