site-content/source/modules/ROOT/pages/blog/Upgrade-Advisory2.adoc (19 lines of code) (raw):

= Upgrade Advisory: 3.0, 3.11, 4.0 Possible for Remote Code Execution for Scripted UDFs :page-layout: single-post :page-role: blog-post :page-post-date: February 18, 2022 :page-post-author: The Apache Cassandra Community :description: The Apache Cassandra Community :keywords: If the operator has configured the cluster in a documented insecure way, it is possible for a malicious user to execute remote code using scripted UDFs. We are advising users of Apache Cassandra 3.0, 3.11 and 4.0 to upgrade or to reset enable_user_defined_functions_threads back to true. The vulnerability being tracked in CASSANDRA-17352 makes it possible for an attacker to execute arbitrary code on the host. It’s important to note that to be exposed the user would have to opt-in to a configuration option that is documented as unsafe in the configuration file. While it’s difficult to estimate exposure to this CVE, it is likely narrow due to the need for opt-in. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE. Mitigation: 1. When running Apache Cassandra with the following configuration: ``` enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false ``` Set `enable_user_defined_functions_threads: true` (this is default) [start=2] 2. We suggest 3.0 users should upgrade to 3.0.26; 3.11 users should upgrade to 3.11.12; and 4.0 users should upgrade to 4.0.3.