mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 10:16:59 +00:00
add CVE-2021-25646
This commit is contained in:
parent
6b14df882a
commit
04a873c7af
BIN
Druid/CVE-2021-25646/CVE-2021-25646.gif
Normal file
BIN
Druid/CVE-2021-25646/CVE-2021-25646.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 529 KiB |
9
Druid/CVE-2021-25646/README.md
Normal file
9
Druid/CVE-2021-25646/README.md
Normal file
@ -0,0 +1,9 @@
|
||||
# CVE-2021-25646 Apache Druid RCE
|
||||
|
||||
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
|
||||
|
||||
**[FOFA](https://fofa.so/result?q=title%3D%22Apache%22+%26%26+title%3D%22Druid%22&qbase64=dGl0bGU9IkFwYWNoZSIgJiYgdGl0bGU9IkRydWlkIg%3D%3D&file=&file=) query rule**: title="Apache" && title="Druid"
|
||||
|
||||
# Demo
|
||||
|
||||

|
Loading…
x
Reference in New Issue
Block a user