In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2020-09-01T20:49:32
Updated: 2024-08-04T12:32:14.251Z
Reserved: 2020-06-08T00:00:00
Link: CVE-2020-13946
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-09-01T21:15:11.833
Modified: 2024-11-21T05:02:12.400
Link: CVE-2020-13946
Redhat