Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44521— Remote code execution for scripted UDFs

EPSS 91.01% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-44521

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Remote code execution for scripted UDFs
Source: NVD (National Vulnerability Database)
Vulnerability Description
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Cassandra 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Cassandra是美国阿帕奇(Apache)基金会的一个分布式Nosql数据库。Cassandra是一个混合型的非关系的数据库,类似于Google的BigTable。其主要功能比Dynamo (分布式的Key-Value存储系统)更丰富,但支持度却不如文档存储MongoDB(介于关系数据库和非关系数据库之间的开源产品,是非关系数据库当中功能最丰富,最像关系数据库的。 Apache Cassandra 存在代码注入漏洞,该漏洞源于在特定配置下攻击者有可能在主机上执行任意代码。攻击者需要有足够
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Cassandra 3.0.0 ~ unspecified -

II. Public POCs for CVE-2021-44521

#POC DescriptionSource LinkShenlong Link
1Automated PoC of CVE-2021-44521https://github.com/WoodenKlaas/CVE-2021-44521POC Details
2full PoC of CVE-2021-44521 https://github.com/Yeyvo/poc-CVE-2021-44521POC Details
3When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2021/CVE-2021-44521.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-44521

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2022-02-11 · 3 CVEs total

CVE-2022-24289Deserialization of untrusted data in the Hessian Component of Apache Cayenne 4.1 with olde
CVE-2022-24112apisix/batch-requests plugin allows overwriting the X-REAL-IP header

IV. Related Vulnerabilities

V. Comments for CVE-2021-44521

No comments yet


Leave a comment