Description
The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. This issue is a regression of CVE-2015-0225. The regression was introduced in https://issues.apache.org/jira/browse/CASSANDRA-12109. The fix for the regression is implemented in https://issues.apache.org/jira/browse/CASSANDRA-14173. This fix is contained in the 3.11.2 release of Apache Cassandra.
Remediation
References
https://lists.apache.org/thread.html/bafb9060bbdf958a1c15ba66c68531116fba4a83858a2796254da066%40%3Cuser.cassandra.apache.org%3E
Related Vulnerabilities
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-common_2.10
CVE-2022-45378 Vulnerability in maven package soap:soap
CVE-2023-28326 Vulnerability in maven package org.apache.openmeetings:openmeetings-parent
CVE-2020-9487 Vulnerability in maven package org.apache.nifi:nifi-web-security
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-shuffle_2.11