Description
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/02/11/4
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/
https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356
https://security.netapp.com/advisory/ntap-20220225-0001/
Related Vulnerabilities
CVE-2020-7784 Vulnerability in npm package ts-process-promises
CVE-2022-36007 Vulnerability in maven package com.github.jlangch:venice
CVE-2020-1938 Vulnerability in maven package org.apache.tomcat:coyote
CVE-2022-43409 Vulnerability in maven package org.jenkins-ci.plugins.workflow:workflow-support
CVE-2019-16777 Vulnerability in maven package org.webjars.npm:bin-links