Skip to content

Missing Authentication for Critical Function in Apache Cassandra

Critical severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Mar 4, 2024

Package

maven org.apache.cassandra:cassandra-all (Maven)

Affected versions

>= 3.8, <= 3.11.1

Patched versions

3.11.2

Description

The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. This issue is a regression of CVE-2015-0225. The regression was introduced in https://issues.apache.org/jira/browse/CASSANDRA-12109. The fix for the regression is implemented in https://issues.apache.org/jira/browse/CASSANDRA-14173. This fix is contained in the 3.11.2 release of Apache Cassandra.

References

Published by the National Vulnerability Database Jun 28, 2018
Published to the GitHub Advisory Database May 13, 2022
Reviewed Jun 29, 2022
Last updated Mar 4, 2024

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2018-8016

GHSA ID

GHSA-52gq-7j6c-xw6x

Source code

No known source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.