CNVD-2021-89547

Vulnerability from cnvd - Published: 2021-11-22
VLAI Severity ?
Title
Apache Druid LoadData存在任意文件读取漏洞
Description
Apache Druid是美国阿帕奇(Apache)基金会的一款使用Java语言编写的、面向列的开源分布式数据库。 Apache Druid存在安全漏洞,该漏洞源于在 Druid ingestion system 中,InputSource用于从某个数据源读取数据。但是,HTTP InputSource 允许经过身份验证的用户以 Druid 服务器进程的权限从其他来源读取数据,例如本地文件系统。 这不是用户直接访问 Druid 时的权限提升,因为 Druid 还提供了Local InputSource,它允许相同级别的访问。 但是当用户通过允许用户指定 HTTP InputSource 而不是 Local InputSource 的应用程序间接与 Druid 交互时,这是有问题的。 在这种情况下,用户可以通过将文件 URL 传递给 HTTP InputSource 来绕过应用程序级别的限制。目前没有详细的漏洞细节提供。
Severity
Patch Name
Apache Druid LoadData存在任意文件读取漏洞的补丁
Patch Description
Apache Druid是美国阿帕奇(Apache)基金会的一款使用Java语言编写的、面向列的开源分布式数据库。 Apache Druid存在安全漏洞,该漏洞源于在 Druid ingestion system 中,InputSource用于从某个数据源读取数据。但是,HTTP InputSource 允许经过身份验证的用户以 Druid 服务器进程的权限从其他来源读取数据,例如本地文件系统。 这不是用户直接访问 Druid 时的权限提升,因为 Druid 还提供了Local InputSource,它允许相同级别的访问。 但是当用户通过允许用户指定 HTTP InputSource 而不是 Local InputSource 的应用程序间接与 Druid 交互时,这是有问题的。 在这种情况下,用户可以通过将文件 URL 传递给 HTTP InputSource 来绕过应用程序级别的限制。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E

Reference
https://nvd.nist.gov/vuln/detail/CVE-2021-36749
Impacted products
Name
Apache Druid <0.22.0
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-36749"
    }
  },
  "description": "Apache Druid\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4f7f\u7528Java\u8bed\u8a00\u7f16\u5199\u7684\u3001\u9762\u5411\u5217\u7684\u5f00\u6e90\u5206\u5e03\u5f0f\u6570\u636e\u5e93\u3002\n\nApache Druid\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728 Druid ingestion system \u4e2d\uff0cInputSource\u7528\u4e8e\u4ece\u67d0\u4e2a\u6570\u636e\u6e90\u8bfb\u53d6\u6570\u636e\u3002\u4f46\u662f\uff0cHTTP InputSource \u5141\u8bb8\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u7528\u6237\u4ee5 Druid \u670d\u52a1\u5668\u8fdb\u7a0b\u7684\u6743\u9650\u4ece\u5176\u4ed6\u6765\u6e90\u8bfb\u53d6\u6570\u636e\uff0c\u4f8b\u5982\u672c\u5730\u6587\u4ef6\u7cfb\u7edf\u3002 \u8fd9\u4e0d\u662f\u7528\u6237\u76f4\u63a5\u8bbf\u95ee Druid \u65f6\u7684\u6743\u9650\u63d0\u5347\uff0c\u56e0\u4e3a Druid \u8fd8\u63d0\u4f9b\u4e86Local InputSource\uff0c\u5b83\u5141\u8bb8\u76f8\u540c\u7ea7\u522b\u7684\u8bbf\u95ee\u3002 \u4f46\u662f\u5f53\u7528\u6237\u901a\u8fc7\u5141\u8bb8\u7528\u6237\u6307\u5b9a HTTP InputSource \u800c\u4e0d\u662f Local InputSource \u7684\u5e94\u7528\u7a0b\u5e8f\u95f4\u63a5\u4e0e Druid \u4ea4\u4e92\u65f6\uff0c\u8fd9\u662f\u6709\u95ee\u9898\u7684\u3002 \u5728\u8fd9\u79cd\u60c5\u51b5\u4e0b\uff0c\u7528\u6237\u53ef\u4ee5\u901a\u8fc7\u5c06\u6587\u4ef6 URL \u4f20\u9012\u7ed9 HTTP InputSource \u6765\u7ed5\u8fc7\u5e94\u7528\u7a0b\u5e8f\u7ea7\u522b\u7684\u9650\u5236\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
  "discovererName": "daozhang123",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-89547",
  "openTime": "2021-11-22",
  "patchDescription": "Apache Druid\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4f7f\u7528Java\u8bed\u8a00\u7f16\u5199\u7684\u3001\u9762\u5411\u5217\u7684\u5f00\u6e90\u5206\u5e03\u5f0f\u6570\u636e\u5e93\u3002\r\n\r\nApache Druid\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728 Druid ingestion system \u4e2d\uff0cInputSource\u7528\u4e8e\u4ece\u67d0\u4e2a\u6570\u636e\u6e90\u8bfb\u53d6\u6570\u636e\u3002\u4f46\u662f\uff0cHTTP InputSource \u5141\u8bb8\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u7528\u6237\u4ee5 Druid \u670d\u52a1\u5668\u8fdb\u7a0b\u7684\u6743\u9650\u4ece\u5176\u4ed6\u6765\u6e90\u8bfb\u53d6\u6570\u636e\uff0c\u4f8b\u5982\u672c\u5730\u6587\u4ef6\u7cfb\u7edf\u3002 \u8fd9\u4e0d\u662f\u7528\u6237\u76f4\u63a5\u8bbf\u95ee Druid \u65f6\u7684\u6743\u9650\u63d0\u5347\uff0c\u56e0\u4e3a Druid \u8fd8\u63d0\u4f9b\u4e86Local InputSource\uff0c\u5b83\u5141\u8bb8\u76f8\u540c\u7ea7\u522b\u7684\u8bbf\u95ee\u3002 \u4f46\u662f\u5f53\u7528\u6237\u901a\u8fc7\u5141\u8bb8\u7528\u6237\u6307\u5b9a HTTP InputSource \u800c\u4e0d\u662f Local InputSource \u7684\u5e94\u7528\u7a0b\u5e8f\u95f4\u63a5\u4e0e Druid \u4ea4\u4e92\u65f6\uff0c\u8fd9\u662f\u6709\u95ee\u9898\u7684\u3002 \u5728\u8fd9\u79cd\u60c5\u51b5\u4e0b\uff0c\u7528\u6237\u53ef\u4ee5\u901a\u8fc7\u5c06\u6587\u4ef6 URL \u4f20\u9012\u7ed9 HTTP InputSource \u6765\u7ed5\u8fc7\u5e94\u7528\u7a0b\u5e8f\u7ea7\u522b\u7684\u9650\u5236\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apache Druid LoadData\u5b58\u5728\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Apache Druid \u003c0.22.0"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-36749",
  "serverity": "\u4e2d",
  "submitTime": "2021-11-19",
  "title": "Apache Druid LoadData\u5b58\u5728\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…