CVE-2021-44521

CRITICAL NUCLEI LAB

Apache Cassandra < 3.0.26 - Code Injection

Title source: rule

Description

When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.

Exploits (3)

nomisec WORKING POC 1 stars
by Yeyvo · poc
https://github.com/Yeyvo/poc-CVE-2021-44521
inthewild WORKING POC
poc
https://github.com/woodenklaas/cve-2021-44521
inthewild WORKING POC
poc
https://github.com/qhpix/cve-2021-44521

Nuclei Templates (1)

Apache Cassandra Load UDF RCE
CRITICALby Y4er
Shodan: cpe:"cpe:2.3:a:apache:cassandra"

Scores

CVSS v3 9.1
EPSS 0.9101
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-94 CWE-732
Status published
Products (2)
apache/cassandra 3.0.0 - 3.0.26
org.apache.cassandra/cassandra-all 0 - 3.0.26Maven
Published Feb 11, 2022
Tracked Since Feb 18, 2026