CVE-2021-26919
Published at:
-
30-03-2021 10:15
Last modified:
-
03-06-2022 03:31
Total changes:
-
7
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
8.8
Base score
2.8
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E
- [druid-dev] 20210331 Regarding the 0.21.0 release-Mailing List
- [druid-dev] 20210401 Re: Subject: [CVE-2021-26919] Authenticated users can execute arbitrary code from malicious MySQL database systems-Mailing List
- [druid-commits] 20210401 [GitHub] [druid] jihoonson merged pull request #11047: Allow list for JDBC connection properties to address CVE-2021-26919-Mailing List
- [druid-dev] 20210405 Regarding the CVSS score for CVE-2021-26919-Mailing List, Vendor Advisory
- [druid-dev] 20210405 Re: Regarding the CVSS score for CVE-2021-26919-Mailing List
- [druid-commits] 20210412 [GitHub] [druid] jihoonson opened a new pull request #11100: [Backport] Allow list for JDBC connection properties to address CVE-2021-26919-Mailing List, Vendor Advisory
- [druid-commits] 20210412 [GitHub] [druid] jihoonson merged pull request #11100: [Backport] Allow list for JDBC connection properties to address CVE-2021-26919-Mailing List, Vendor Advisory
- [druid-dev] 20210414 Re: Regarding the CVSS score for CVE-2021-26919-Mailing List
Keywords