Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27137

Опубликовано: 04 фев. 2025
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

In Apache Cassandra it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorized operations. This is same vulnerability that CVE-2020-13946 was issued for, but the Java option was changed in JDK10. This issue affects Apache Cassandra from 4.0.2 through 5.0.2 running Java 11. Operators are recommended to upgrade to a release equal to or later than 4.0.15, 4.1.8, or 5.0.3 which fixes the issue.

Отчет

This CVE affects below version of Apache Cassandra which is not shipped in Red Hat products:

  • Apache Cassandra 4.0.2 before 4.0.15
  • Apache Cassandra 4.1.0 before 4.1.8
  • Apache Cassandra 5.0-beta1 before 5.0.3

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2org.apache.cassandra/cassandra-allNot affected
Red Hat Data Grid 8org.apache.cassandra/cassandra-allNot affected
Red Hat Fuse 7org.apache.cassandra/cassandra-allNot affected
Red Hat Integration Camel K 1org.apache.cassandra/cassandra-allNot affected
Red Hat JBoss Data Grid 7org.apache.cassandra/cassandra-allNot affected
Red Hat JBoss Enterprise Application Platform 7org.apache.cassandra/cassandra-allNot affected
Red Hat JBoss Enterprise Application Platform 8org.apache.cassandra/cassandra-allNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packorg.apache.cassandra/cassandra-allNot affected
streams for Apache Kafkaorg.apache.cassandra/cassandra-allNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2343725org.apache.cassandra:cassandra-all: Apache Cassandra: unrestricted deserialization of JMX authentication credentials

EPSS

Процентиль: 16%
0.00052
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
11 месяцев назад

In Apache Cassandra it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorized operations. This is same vulnerability that CVE-2020-13946 was issued for, but the Java option was changed in JDK10. This issue affects Apache Cassandra from 4.0.2 through 5.0.2 running Java 11. Operators are recommended to upgrade to a release equal to or later than 4.0.15, 4.1.8, or 5.0.3 which fixes the issue.

CVSS3: 5.3
debian
11 месяцев назад

In Apache Cassandra it is possible for a local attacker without access ...

CVSS3: 5.9
github
11 месяцев назад

Apache Cassandra: unrestricted deserialization of JMX authentication credentials

CVSS3: 3.3
fstec
почти 2 года назад

Уязвимость интерфейса JMX распределённой системы управления базами данных Apache Cassandra, позволяющая нарушителю реализовать атаку типа «человек посередине»

CVSS3: 9.9
redos
25 дней назад

Множественные уязвимости Cassandra

EPSS

Процентиль: 16%
0.00052
Низкий

5.9 Medium

CVSS3