Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:49.264Z
Reserved: 2021-01-21T00:00:00.000Z
Link: CVE-2021-25646

No data.

Status : Modified
Published: 2021-01-29T20:15:12.997
Modified: 2024-11-21T05:55:12.470
Link: CVE-2021-25646
