漏洞描述 Log4j是Apache的一个开源项目,该漏洞产生的原因在于Log4j在记录日志的过程中会对日志内容进行判断,如果内容中包含了${,则Log4j会认为此字符属于JNDI远程加载类的地址。ApacheDruid 使用了该项目进行记录日志,攻击者通过构造恶意的代码即可利用该漏洞,从而导致服务器权限丢失
相关漏洞推荐 Apache Druid存在服务器请求伪造漏洞(CVE-2025-27888) POC CVE-2021-25646: Apache Druid - Remote Code Execution POC CVE-2021-36749: Apache Druid - Local File Inclusion POC CVE-2023-25194: Apache Druid Kafka Connect - Remote Code Execution POC CVE-2025-27888: Apache Druid - Server-Side Request Forgery POC CVE-2021-25646: Apache Druid - Remote Code Execution POC CVE-2021-36749: Apache Druid Authentication Restrictions Bypass POC CVE-2023-25194: Apache Druid kafka RCE 漏洞 POC druid-default-login: Apache Druid Default Login POC apache-druid-unauth: Apache Druid Unauth POC apache-druid-unauth: Apache Druid Unauth POC apache-druid-log4j-rce: Apache Druid - Remote Code Execution (Apache Log4j) Apache Druid Kafka Connect 远程代码执行漏洞(CVE-2023-25194)