漏洞描述 在 Druid 摄取系统中,InputSource 用于从某个数据源读取数据。HTTP InputSource 允许经过身份验证的用户以 Druid服务器进程的权限从其他来源读取数据。当用户通过允许用户指定 HTTP InputSource 而不是 Local InputSource 的应用程序间接与Druid 交互时,用户可以通过将文件 URL 传递给 HTTP InputSource 来绕过应用程序级别的限制,从而造成任意文件读取。
相关漏洞推荐 CVE-2021-25646: Apache Druid - Remote Code Execution POC 2025-09-01 | Apache Druid Apache Druid is susceptible to remote code execution because by default it lacks authorization and a... CVE-2021-36749: Apache Druid Authentication Restrictions Bypass POC 2025-09-01 | Apache Druid In the Druid ingestion system, the InputSource is used for reading data from a certain data source. ... druid-default-login: Apache Druid Default Login POC 2025-09-01 | Apache Druid Apache Druid default login information (admin/admin) was discovered. FOFA: title="druid monitor... ShowDoc /server/index.php?s=/api/adminUpdate/download 文件上传漏洞(CVE-2021-36440) 无POC 2025-09-12 | ShowDoc ShowDoc 2.9.5版本存在一个高危的文件上传漏洞(CVE-2021-36440),该漏洞源于系统未能对上传文件的类型进行充分验证。攻击者可以绕过安全限制上传任意类型的危险文件,包括但不限于PH... CVE-2021-1497: Cisco HyperFlex HX Data Platform - Remote Command Execution POC 2025-09-01 | Cisco HyperFlex HX Data Platform Cisco HyperFlex HX contains multiple vulnerabilities in the web-based management interface that coul...