Goby/json/Apache-Druid-Arbitrary-File...

69 lines
3.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Apache Druid Arbitrary File Read (CVE-2021-36749)",
"Description": "<p>Apache Druid is a high performance real-time analytics database.</p><p>Apache Druid <= 0.21.1 version has arbitrary file reading vulnerabilities. Attackers can obtain sensitive information such as configuration files to further control the system.</p>",
"Product": "Apache Druid",
"Homepage": "https://druid.apache.org",
"DisclosureDate": "2021-09-25",
"Author": "1291904552@qq.com",
"FofaQuery": "body=\"Apache Druid\" && (body=\"console-config.js\" || body=\"www.apache.org\")",
"GobyQuery": "body=\"Apache Druid\" && (body=\"console-config.js\" || body=\"www.apache.org\")",
"Level": "2",
"Impact": "<p>Apache Druid <= 0.21.1 version has arbitrary file reading vulnerabilities. Attackers can obtain sensitive information such as configuration files to further control the system.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://druid.apache.org\">https://druid.apache.org</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Apache Druid 数据库平台任意文件读取漏洞CVE-2021-36749",
"Product": "Apache Druid",
"VulType": ["文件读取"],
"Tags": ["文件读取"],
"Description": "<p>Apache Druid是美国阿帕奇软件Apache基金会的一款使用Java语言编写的、面向列的开源分布式数据库。</p><p>Apache Druid <= 0.21.1版本存在任意文件读取漏洞,攻击者可获取配置文件等敏感信息,进一步控制系统。</p>",
"Impact": "<p>Apache Druid <= 0.21.1版本存在任意文件读取漏洞,攻击者可获取配置文件等敏感信息,进一步控制系统。</p>",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://druid.apache.org\">https://druid.apache.org</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "Apache Druid Arbitrary File Read (CVE-2021-36749)",
"Product": "Apache Druid",
"VulType": ["fileread"],
"Tags": ["fileread"],
"Description": "<p>Apache Druid is a high performance real-time analytics database.</p><p>Apache Druid <= 0.21.1 version has arbitrary file reading vulnerabilities. Attackers can obtain sensitive information such as configuration files to further control the system.</p>",
"Impact": "<p>Apache Druid <= 0.21.1 version has arbitrary file reading vulnerabilities. Attackers can obtain sensitive information such as configuration files to further control the system.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://druid.apache.org\">https://druid.apache.org</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://github.com/BrucessKING/CVE-2021-36749"
],
"HasExp": true,
"ExpParams": [
{
"name": "filepath",
"type": "input",
"value": "file:///etc/passwd"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"fileread"
],
"VulType": [
"fileread"
],
"CVEIDs": [
"CVE-2021-36749"
],
"CVSSScore": "6.5",
"AttackSurfaces": {
"Application": ["Apache Druid"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
""
],
"CNVD": [
""
]
}