The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1947.html - | |
References | () http://www.mail-archive.com/user%40cassandra.apache.org/msg41819.html - | |
References | () http://www.securityfocus.com/archive/1/535154/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/73478 - | |
References | () http://www.securitytracker.com/id/1034002 - |
07 Nov 2023, 02:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-04-03 14:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-0225
Mitre link : CVE-2015-0225
CVE.ORG link : CVE-2015-0225
JSON object : View
Products Affected
apache
- cassandra
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')