Description
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
Remediation
References
https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356
http://www.openwall.com/lists/oss-security/2022/02/11/4
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/
https://security.netapp.com/advisory/ntap-20220225-0001/
Related Vulnerabilities
CVE-2021-27850 Vulnerability in maven package org.apache.tapestry:tapestry-core
CVE-2022-41250 Vulnerability in maven package com.meowlomo.jenkins:scm-httpclient
CVE-2016-8629 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2021-32850 Vulnerability in npm package @claviska/jquery-minicolors
CVE-2020-36187 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind