PT-2024-31590 · Apache · Apache Druid
Mr-N30
·
Published
2024-09-17
·
Updated
2024-10-02
·
CVE-2024-45384
CVSS v3.1
5.3
Medium
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Apache Druid versions 0.18.0 through 30.0.0
Description
The issue is a Padding Oracle vulnerability in the Apache Druid extension, druid-pac4j, which could allow an attacker to manipulate a pac4j session cookie. Since the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this issue. While there is no known way to meaningfully exploit this flaw, it is recommended to take precautions.
Recommendations
For Apache Druid versions 0.18.0 through 30.0.0, upgrade to version 30.0.1 or higher to fix the issue.
Ensure a strong
druid.auth.pac4j.cookiePassphrase is set as a precaution.Fix
Generation of Error Message Containing Sensitive Information
Improper Verification of Cryptographic Signature
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Apache Druid