First published: Fri Jan 29 2021(Updated: )
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Druid | <=0.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25646 is a vulnerability in Apache Druid that allows an authenticated user to execute user-provided JavaScript code.
The severity of CVE-2021-25646 is critical, with a CVSS score of 8.8.
CVE-2021-25646 affects Apache Druid versions up to and including 0.20.0.
No, the execution of user-provided JavaScript code is disabled by default in Apache Druid.
To fix CVE-2021-25646, users should update to a version of Apache Druid that is later than 0.20.0.