358
VMScore

CVE-2021-36749

Published: 24/09/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 358
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache druid

Vendor Advisories

In the Druid ingestion system, the InputSource is used for reading data from a certain data source However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process This is not an elevation of privilege when users access Druid dire ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2021-36749: Apache Druid: The HTTP inputSource allows authenticated users to read data from other sources than intended (in ...

Github Repositories

CVE-2021-36749 About - In the Druid ingestion system, the InputSource is used for reading data from a certain data source However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process This is not an elevation of privilege when users access Druid directly, s

Apache Druid LoadData 任意文件读取漏洞 / Code By:Jun_sheng

CVE-2021-36749 Apache Druid LoadData 任意文件读取漏洞 Code By:Jun_sheng @橘子网络安全实验室 橘子网络安全实验室 0rangeteam/ 0x00 风险概述 本工具仅限授权安全测试使用,禁止未授权非法攻击站点 在线阅读《中华人民共和国网络安全法》 0x01 工具使用 将资产整理后放入urltxt,命令行输入Python CVE

Apache Druid 任意文件读取

CVE-2021-36749 Apache Druid 任意文件读取 受影响版本:version &lt;= 0211 使用以下两种方式均可 命令行方式 curl 127001:8888/druid/indexer/v1/sampler?for=connect -H "Content-Type:application/json" -X POST -d "{\"type\":\"index\",\"spec\":{\"type\":\"index\",\"ioConfig\&q

CVE-2021-36749 Docker 漏洞复现

apache_druid_CVE-2021-36749 CVE-2021-36749 Docker 漏洞复现 导入docker镜像: docker import apache_druidtar apache:1 启动docker: docker run -id --name apache_druid -p 8081:8081 -p 8082:8082 -p 8083:8083 -p 8888:8888 -p 8091:8091 -p 2181:2181 镜像ID /bin/bash 进入docker 执行start_apache_druidsh启动apache_druid 提示OK即可登录localhost:888

HB团队公开扫描仪

HScan 项目创建于北京时间2023年2月19日 作者近期需要参加学校比赛,该项目更新比较慢 功能: -- poc扫描(单链接或者批量扫描) -- 网页url提取 -- 权重查询 未来更新功能: -- 自动化深度扫描 -- cms指纹识别 -- 多线程工作 -- 更新更丰富的poc库

Apache Druid docker.

설치 및 실행 순서 Apache사에서 제공한 Druid에 대한 분석 환경 구축을 위한 docker-composeyml 파일입니다 8998번 포트를 이용하여 Remote Debugging 기능을 추가하였습니다 너무 많은 메모리 할당으로 인한 실행 딜레이를 줄였습니다 version : 0200 // 이 버전은 docker-composeyml 파일의 버전을 수정하