尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Apache Software Foundation | Apache Cassandra | 3.0.0 ~ unspecified | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Automated PoC of CVE-2021-44521 | https://github.com/WoodenKlaas/CVE-2021-44521 | POC详情 |
| 2 | full PoC of CVE-2021-44521 | https://github.com/Yeyvo/poc-CVE-2021-44521 | POC详情 |
| 3 | When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2021/CVE-2021-44521.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论