First published: Fri Apr 03 2015(Updated: )
The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Cassandra | =1.2.0 | |
Apache Cassandra | =1.2.1 | |
Apache Cassandra | =1.2.2 | |
Apache Cassandra | =1.2.3 | |
Apache Cassandra | =1.2.4 | |
Apache Cassandra | =1.2.5 | |
Apache Cassandra | =1.2.6 | |
Apache Cassandra | =1.2.7 | |
Apache Cassandra | =1.2.8 | |
Apache Cassandra | =1.2.9 | |
Apache Cassandra | =1.2.10 | |
Apache Cassandra | =1.2.11 | |
Apache Cassandra | =1.2.12 | |
Apache Cassandra | =1.2.13 | |
Apache Cassandra | =1.2.14 | |
Apache Cassandra | =1.2.15 | |
Apache Cassandra | =1.2.16 | |
Apache Cassandra | =1.2.17 | |
Apache Cassandra | =1.2.18 | |
Apache Cassandra | =1.2.19 | |
Apache Cassandra | =2.0.0 | |
Apache Cassandra | =2.0.1 | |
Apache Cassandra | =2.0.2 | |
Apache Cassandra | =2.0.3 | |
Apache Cassandra | =2.0.4 | |
Apache Cassandra | =2.0.5 | |
Apache Cassandra | =2.0.6 | |
Apache Cassandra | =2.0.7 | |
Apache Cassandra | =2.0.8 | |
Apache Cassandra | =2.0.9 | |
Apache Cassandra | =2.0.10 | |
Apache Cassandra | =2.0.11 | |
Apache Cassandra | =2.0.12 | |
Apache Cassandra | =2.0.13 | |
Apache Cassandra | =2.1.0 | |
Apache Cassandra | =2.1.1 | |
Apache Cassandra | =2.1.2 | |
Apache Cassandra | =2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.