Apache Cassandra 1.2.x <= 1.2.19 / 2.0.x <= 2.0.13 / 2.1.x <= 2.1.3 RCE

critical Nessus Plugin ID 143420

Synopsis

A database running on the remote host is affected by a remote code execution vulnerability .

Description

The default configuration in Apache Cassandra running on the remote host version 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 bound an unauthenticated JMX/RMI interface to all network interfaces. A remote attacker able to access the RMI, an API for the transport and remote execution of serialized Java, could use this flaw to execute arbitrary code as the user running Cassandra.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the latest version of Apache Cassandra, refer to the vendor advisory for relevant patch and configuration settings.

See Also

http://www.nessus.org/u?97b7ae44

http://www.nessus.org/u?311e0da4

Plugin Details

Severity: Critical

ID: 143420

File Name: apache_cassandra_rmi_rce_2015.nasl

Version: 1.2

Type: combined

Agent: unix

Family: Databases

Published: 12/2/2020

Updated: 12/3/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-0225

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:cassandra

Required KB Items: installed_sw/Apache Cassandra

Exploit Ease: No known exploits are available

Patch Publication Date: 4/3/2015

Vulnerability Publication Date: 4/3/2015

Reference Information

CVE: CVE-2015-0225

BID: 73478

CWE: 77