CVE-2021-25646

Scores

EPSS Score

0.9433

CVSS

3.x 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

All CVSS Scores

CVSS 4.0
0.0
CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.

Sources

nvd

CWEs

CWE-94

Exploits

Exploit ID: CVE-2021-25646

Source: github-poc

URL: https://github.com/tiemio/RCE-PoC-CVE-2021-25646

Reference Links

Vulnerable Software

Type: Configuration

Vendor: apache

Product: druid

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "0.20.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd