Home ยป Database

AVID-2026-R0720

Description

Authenticated users can override system configurations in their requests which allows them to execute arbitrary code. (CVE-2021-25646)

Details

Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.

Reason for inclusion in AVID: CVE-2021-25646 describes an authenticated RCE via user-provided JavaScript in Apache Druid. Apache Druid is a widely-used data-store/processing component that can be part of AI data pipelines and deployment stacks. As such, this vulnerability falls within software components used to build/run general-purpose AI systems, representing a security risk in the AI software supply chain.

References

Affected or Relevant Artifacts

  • Developer: Apache Software Foundation
  • Deployer: Apache Software Foundation
  • Artifact Details:
TypeName
SystemApache Druid

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-01-29
  • Version: 0.3.3
  • AVID Entry