Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
Users should upgrade to Druid 0.20.1. Whenever possible, network access to cluster machines should be restricted to trusted hosts only.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:49.264Z
Reserved: 2021-01-21T00:00:00.000Z
Link: CVE-2021-25646

No data.

Status : Modified
Published: 2021-01-29T20:15:12.997
Modified: 2024-11-21T05:55:12.470
Link: CVE-2021-25646


No data.