Page 2 of 7 results (0.003 seconds)

CVSS: 9.0EPSS: 97%CPEs: 1EXPL: 7

Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process. Apache Druid incluye la capacidad de ejecutar código JavaScript proporcionado por el usuario insertado en varios tipos de peticiones. • https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646 https://github.com/j2ekim/CVE-2021-25646 https://github.com/givemefivw/CVE-2021-25646 https://github.com/lp008/CVE-2021-25646 https://github.com/Ormicron/CVE-2021-25646-GUI http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html http://www.openwall.com/lists/oss-security/2021/01/29/6 https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f%40%3Ccommits.druid.apache. •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user. Cuando la autenticación LDAP está habilitada en Apache Druid versión 0.17.0, las personas que llaman desde las API de Druid con un conjunto válido de credenciales LDAP pueden omitir la barrera de filtro credentialsValidator.userSearch que determina si un usuario LDAP válido está habilitado para autenticarse con Druid. • https://github.com/ggolawski/CVE-2020-1958 https://lists.apache.org/thread.html/r026540c617d334007810cd8f0068f617b5c78444be00a31fc1b03390%40%3Ccommits.druid.apache.org%3E https://lists.apache.org/thread.html/r1526dbce98a138629a41daa06c13393146ddcaf8f9d273cc49d57681%40%3Ccommits.druid.apache.org%3E https://lists.apache.org/thread.html/r1c32c95543d44559b8d7fd89b0a85f728c80e8b715685bbf788a15a4%40%3Ccommits.druid.apache.org%3E https://lists.apache.org/thread.html/r47c90a378efdb3fd07ff7f74095b8eb63b3ca93b8ada5c2661c5e371%40%3Ccommits.druid.apache.org%3E https://lists.apache.org&#x • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •