The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-5523 | The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. |
![]() |
GHSA-w7f2-gjxf-2gm9 | Improper Neutralization of Special Elements used in a Command in Apache Cassandra |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:03:10.365Z
Reserved: 2014-11-18T00:00:00
Link: CVE-2015-0225

No data.

Status : Deferred
Published: 2015-04-03T14:59:00.070
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-0225


No data.