Vulnerability Details : CVE-2021-44521
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
Vulnerability category: Execute code
Products affected by CVE-2021-44521
- cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
Threat overview for CVE-2021-44521
Top countries where our scanners detected CVE-2021-44521
Top open port discovered on systems with this issue
9042
IPs affected by CVE-2021-44521 4,363
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2021-44521!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2021-44521
35.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-44521
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
2.3
|
6.0
|
NIST |
CWE ids for CVE-2021-44521
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: security@apache.org (Secondary)
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-44521
-
http://www.openwall.com/lists/oss-security/2022/02/11/4
oss-security - CVE-2021-44521: Apache Cassandra: Remote code execution for scripted UDFsMailing List;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20220225-0001/
CVE-2021-44521 Apache Cassandra Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/
CVE-2021-44521: RCE Vulnerability in Apache CassandraExploit;Mitigation;Third Party Advisory
-
https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356
CVE-2021-44521: Apache Cassandra: Remote code execution for scripted UDFs-Apache Mail ArchivesIssue Tracking;Mailing List;Vendor Advisory
Jump to