CVE-2021-25646
HIGH EXPLOITED IN THE WILD NUCLEIApache Druid <0.20.0 - XSS
Title source: llmDescription
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Exploits (13)
nomisec
SUSPICIOUS
3 stars
by Vulnmachines · remote
https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646
nomisec
WORKING POC
by ShadowLance2 · remote
https://github.com/ShadowLance2/Apache-Druid-CVE-2021-25646-Exploit
metasploit
WORKING POC
EXCELLENT
by Litch1, Security Team of Alibaba Cloud, je5442804 · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/apache_druid_js_rce.rb
Nuclei Templates (1)
Apache Druid - Remote Code Execution
HIGHby pikpikcu
References (16)
Scores
CVSS v3
8.8
EPSS
0.9397
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-11-13
InTheWild.io
2024-05-29
Status
published
Products (2)
apache/druid
< 0.20.0
org.apache.druid/druid
0 - 0.20.1Maven
Published
Jan 29, 2021
Tracked Since
Feb 18, 2026