Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qaDY2LTM1NDUtdnBtN84AA_nI

Apache Druid: Users can provide MySQL JDBC properties not on allow list

Apache Druid allows users with certain permissions to read data from other database systems using JDBC. This functionality allows trusted users to set up Druid lookups or run ingestion tasks. Druid also allows administrators to configure a list of allowed properties that users are able to provide for their JDBC connections. By default, this allowed properties list restricts users to TLS-related properties only. However, when configuration a MySQL JDBC connection, users can use a particularly-crafted JDBC connection string to provide properties that are not on this allow list.

Users without the permission to configure JDBC connections are not able to exploit this vulnerability.
CVE-2021-26919 describes a similar vulnerability which was partially addressed in Apache Druid 0.20.2.

This issue is fixed in Apache Druid 30.0.1.

Permalink: https://github.com/advisories/GHSA-jh66-3545-vpm7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qaDY2LTM1NDUtdnBtN84AA_nI
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 3 days ago
Updated: 3 days ago


CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-jh66-3545-vpm7, CVE-2024-45537
References: Repository: https://github.com/apache/druid
Blast Radius: 0.0

Affected Packages

maven:org.apache.druid:druid
Dependent packages: 1
Dependent repositories: 1
Downloads:
Affected Version Ranges: < 30.0.1
Fixed in: 30.0.1
All affected versions: 0.17.0, 0.17.1, 0.18.0, 0.18.1, 0.19.0, 0.20.0, 0.20.1, 0.20.2, 0.21.0, 0.21.1, 0.22.0, 0.22.1, 0.23.0, 24.0.0, 24.0.1, 24.0.2, 25.0.0, 26.0.0, 27.0.0, 28.0.0, 28.0.1, 29.0.0, 29.0.1, 30.0.0
All unaffected versions: