Show filters
34 Total Results
Displaying 21-30 of 34
Sort by:
Attacker Value
Unknown

CVE-2021-33800

Disclosure Date: November 03, 2021 (last updated November 28, 2024)
In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal.
Attacker Value
Unknown

CVE-2021-36749

Disclosure Date: September 24, 2021 (last updated November 08, 2023)
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
Attacker Value
Unknown

CVE-2021-38559

Disclosure Date: August 26, 2021 (last updated November 28, 2024)
DigitalDruid HotelDruid 3.0.2 has an XSS vulnerability in prenota.php affecting the fineperiodo1 parameter.
Attacker Value
Unknown

CVE-2021-37832

Disclosure Date: August 03, 2021 (last updated November 28, 2024)
A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter.
Attacker Value
Unknown

CVE-2021-37833

Disclosure Date: August 03, 2021 (last updated November 28, 2024)
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
Attacker Value
Unknown

CVE-2021-26920

Disclosure Date: July 02, 2021 (last updated November 08, 2023)
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource.
Attacker Value
Unknown

CVE-2021-26919

Disclosure Date: March 30, 2021 (last updated November 08, 2023)
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
Attacker Value
Unknown

CVE-2020-1958

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
Attacker Value
Unknown

CVE-2019-9085

Disclosure Date: June 24, 2019 (last updated November 27, 2024)
Hoteldruid before v2.3.1 allows remote authenticated users to cause a denial of service (invoice-creation outage) via the n_file parameter to visualizza_contratto.php with invalid arguments (any non-numeric value), as demonstrated by the anno=2019&id_transazione=1&numero_contratto=1&n_file=a query string to visualizza_contratto.php.
0
Attacker Value
Unknown

CVE-2019-9086

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
HotelDruid before v2.3.1 has SQL Injection via the /visualizza_tabelle.php anno parameter.
0