一、 漏洞 CVE-2021-25646 基础信息
漏洞标题
经过身份验证的用户可以在其请求中覆盖系统配置,从而可以执行任意代码。
来源:AIGC 神龙大模型
漏洞描述信息
已授权用户可以在其请求中覆盖系统配置,从而执行任意代码。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
Authenticated users can override system configurations in their requests which allows them to execute arbitrary code.
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache Druid 访问控制错误漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Apache Druid是美国阿帕奇软件(Apache)基金会的一款使用Java语言编写的、面向列的开源分布式数据库。 Apache Druid 0.20.0和更早的版本存在访问控制错误漏洞,该漏洞允许经过身份验证的用户强制Druid运行用户提供的JavaScript代码,并执行服务器进程特权的代码。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
授权问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2021-25646 的公开POC
# POC 描述 源链接 神龙链接
1 Apache Druid 远程代码执行;检测脚本 https://github.com/yaunsky/cve-2021-25646 POC详情
2 None https://github.com/lp008/CVE-2021-25646 POC详情
3 CSharp CVE-2021-25646-GUI https://github.com/Ormicron/CVE-2021-25646-GUI POC详情
4 None https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646 POC详情
5 Alibaba-Nacos-Unauthorized/ApacheDruid-RCE_CVE-2021-25646/MS-Exchange-SSRF-CVE-2021-26885/Oracle-WebLogic-CVE-2021-2109_RCE/RG-CNVD-2021-14536/RJ-SSL-VPN-UltraVires/Redis-Unauthorized-RCE/TDOA-V11.7-GetOnlineCookie/VMware-vCenter-GetAnyFile/yongyou-GRP-U8-XXE/Oracle-WebLogic-CVE-2020-14883/Oracle-WebLogic-CVE-2020-14882/Apache-Solr-GetAnyFile/F5-BIG-IP-CVE-2021-22986/Sonicwall-SSL-VPN-RCE/GitLab-Graphql-CNVD-2021-14193/D-Link-DCS-CVE-2020-25078/WLAN-AP-WEA453e-RCE/360TianQing-Unauthorized/360TianQing-SQLinjection/FanWeiOA-V8-SQLinjection/QiZhiBaoLeiJi-AnyUserLogin/QiAnXin-WangKangFirewall-RCE/金山-V8-终端安全系统/NCCloud-SQLinjection/ShowDoc-RCE https://github.com/1n7erface/PocList POC详情
6 CVE-2021-25646 Apache Druid 远程代码执行漏洞 Wker脚本 https://github.com/givemefivw/CVE-2021-25646 POC详情
7 Apache Druid remote code execution vulnerability - Apache Druid 远程代码执行漏洞利用 CVE-2021-25646 https://github.com/j2ekim/CVE-2021-25646 POC详情
8 CVE-2021-25646 Apache Druid 远程代码执行 漏洞检测和利用工具 https://github.com/luobai8/CVE-2021-25646-exp POC详情
9 Apache Druid 远程代码执行复现(CVE-2021-25646) https://github.com/gps1949/CVE-2021-25646 POC详情
10 Apache Druid is susceptible to remote code execution because by default it lacks authorization and authentication. Attackers can send specially crafted requests to execute arbitrary code with the privileges of processes on the Druid server. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-25646.yaml POC详情
11 None https://github.com/Threekiii/Awesome-POC/blob/master/%E6%95%B0%E6%8D%AE%E5%BA%93%E6%BC%8F%E6%B4%9E/Apache%20Druid%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-25646.md POC详情
12 None https://github.com/Threekiii/Awesome-POC/blob/master/%E6%95%B0%E6%8D%AE%E5%BA%93%E6%BC%8F%E6%B4%9E/Apache%20Druid%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-25646.md POC详情
13 https://github.com/vulhub/vulhub/blob/master/apache-druid/CVE-2021-25646/README.md POC详情
三、漏洞 CVE-2021-25646 的情报信息