Description
The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. This issue is a regression of CVE-2015-0225. The regression was introduced in https://issues.apache.org/jira/browse/CASSANDRA-12109. The fix for the regression is implemented in https://issues.apache.org/jira/browse/CASSANDRA-14173. This fix is contained in the 3.11.2 release of Apache Cassandra.
Remediation
References
https://lists.apache.org/thread.html/bafb9060bbdf958a1c15ba66c68531116fba4a83858a2796254da066%40%3Cuser.cassandra.apache.org%3E
Related Vulnerabilities
CVE-2020-13920 Vulnerability in maven package org.apache.activemq:activemq-core
CVE-2022-23945 Vulnerability in maven package org.apache.shenyu:shenyu-common
CVE-2021-29442 Vulnerability in maven package com.alibaba.nacos:nacos-common
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-common_2.11
CVE-2022-23944 Vulnerability in maven package org.apache.shenyu:shenyu-common