Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w88f-4875-99c8

Опубликовано: 26 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Apache Druid’s Kerberos authenticator uses a weak fallback secret

Apache Druid’s Kerberos authenticator uses a weak fallback secret when the druid.auth.authenticator.kerberos.cookieSignatureSecret configuration is not explicitly set. In this case, the secret is generated using ThreadLocalRandom, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong druid.auth.authenticator.kerberos.cookieSignatureSecret

This issue affects Apache Druid: through 34.0.0.

Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set druid.auth.authenticator.kerberos.cookieSignatureSecret when using the Kerberos authenticator. Services will fail to come up if the secret is not set.

Пакеты

Наименование

org.apache.druid:druid

maven
Затронутые версииВерсия исправления

< 35.0.0

35.0.0

EPSS

Процентиль: 23%
0.00075
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 9.8
nvd
2 месяца назад

Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.

CVSS3: 9.8
debian
2 месяца назад

Apache Druid\u2019s Kerberos authenticator uses a weak fallback secret ...

EPSS

Процентиль: 23%
0.00075
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-338