Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
Fixes

Solution

No solution given by the vendor.


Workaround

Users should upgrade to Druid 0.20.2 and enable new Druid configurations to mitigate vulnerable MySQL JDBC properties. Whenever possible, network access to cluster machines should be restricted to trusted hosts only. Ensure that users have the minimum set of Druid permissions necessary, and are not granted access to functionality that they do not require.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-13T16:27:55.797Z

Reserved: 2021-02-09T00:00:00.000Z

Link: CVE-2021-26919

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-30T08:15:11.340

Modified: 2024-11-21T05:57:02.660

Link: CVE-2021-26919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.