Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-0225

Опубликовано: 01 апр. 2015
Источник: redhat
CVSS2: 7.5

Описание

The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.

It was found that Apache Cassandra bound an unauthenticated JMX/RMI interface to all network interfaces. A remote attacker able to access the RMI, an API for the transport and remote execution of serialized Java, could use this flaw to execute arbitrary code as the user running Cassandra.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Operations Network 2CassandraNot affected
Red Hat JBoss Operations Network 3CassandraAffected
Red Hat JBoss Operations Network 3.3FixedRHSA-2015:194728.10.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-306
https://bugzilla.redhat.com/show_bug.cgi?id=1208181Cassandra: remote code execution via unauthenticated JMX/RMI interface

7.5 High

CVSS2

Связанные уязвимости

nvd
почти 11 лет назад

The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.

debian
почти 11 лет назад

The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2. ...

github
больше 3 лет назад

Improper Neutralization of Special Elements used in a Command in Apache Cassandra

7.5 High

CVSS2