GHSA-wrqf-rrrw-w3mg

Suggest an improvement
Source
https://github.com/advisories/GHSA-wrqf-rrrw-w3mg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-wrqf-rrrw-w3mg/GHSA-wrqf-rrrw-w3mg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wrqf-rrrw-w3mg
Aliases
Published
2021-06-16T17:40:47Z
Modified
2023-11-08T04:05:15.702845Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Code injection in Apache Druid
Details

Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.

Database specific
{
    "nvd_published_at": "2021-01-29T20:15:00Z",
    "github_reviewed_at": "2021-04-05T21:52:53Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-732"
    ]
}
References

Affected packages

Maven / org.apache.druid:druid

Package

Name
org.apache.druid:druid
View open source insights on deps.dev
Purl
pkg:maven/org.apache.druid/druid

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20.1

Affected versions

0.*

0.13.0-incubating
0.14.0-incubating
0.14.1-incubating
0.14.2-incubating
0.15.0-incubating
0.15.1-incubating
0.16.0-incubating
0.16.1-incubating
0.17.0
0.17.1
0.18.0
0.18.1
0.19.0
0.20.0