When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356 | Issue Tracking Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/02/11/4 | Mailing List Third Party Advisory |
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/ | Exploit Mitigation Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220225-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-02-11 05:15
Updated : 2022-08-08 17:39
NVD link : CVE-2021-44521
Mitre link : CVE-2021-44521
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
apache
- cassandra