When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
Workaround:
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356 | vendor advisory mailing list issue tracking |
http://www.openwall.com/lists/oss-security/2022/02/11/4 | third party advisory mailing list |
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/ | mitigation third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220225-0001/ | third party advisory |