First published: Tue Sep 17 2024(Updated: )
Padding Oracle vulnerability in Apache Druid extension, druid-pac4j. This could allow an attacker to manipulate a pac4j session cookie. This issue affects Apache Druid versions 0.18.0 through 30.0.0. Since the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this vulnerability. While we are not aware of a way to meaningfully exploit this flaw, we nevertheless recommend upgrading to version 30.0.1 or higher which fixes the issue and ensuring you have a strong druid.auth.pac4j.cookiePassphrase as a precaution.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.druid.extensions:druid-pac4j | >=0.18.0<30.0.1 | 30.0.1 |
Apache Druid | >=0.18.0<30.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45384 is classified as a moderate severity vulnerability.
To mitigate CVE-2024-45384, upgrade the Apache Druid extension druid-pac4j to version 30.0.1 or later.
CVE-2024-45384 affects Apache Druid versions from 0.18.0 to 30.0.0.
CVE-2024-45384 allows an attacker to manipulate a pac4j session cookie, potentially compromising session security.
No, the druid-pac4j extension is optional and disabled by default in Apache Druid.