Researchers revealed a now-patched high-severity security vulnerability in Apache Cassandra. If unaddressed, the vulnerability could be abused to gain remote code execution (RCE) on affected installations.
Cassandra is a highly scalable, distributed NoSQL database that is extremely popular due to the benefits of its distributed nature. Cassandra is used by enterprises such as Netflix, Twitter, Urban Airship, Constant Contact, Reddit, Cisco, OpenX, Digg, CloudKick, Ooyala, and more. Cassandra is also extremely popular in DevOps and cloud-native development circles, as can be seen by its support in CNCF projects (such as Jaeger), JFrog says.
Casey Bisson, Head of Product and Developer Relations at BluBracket, says Apache Cassandra is reported to be used as critical infrastructure supporting multiple top-tier internet giants, so a remote code execution vulnerability could have a broad impact with very serious consequences as a threat actor could read or manipulate sensitive data in vulnerable configurations.
Fortunately, Bisson says, "default configurations are not vulnerable, and the configuration variable suggests the risk. However, if a threat actor can gain access to the configuration, they could enable the vulnerability without the operators being aware."
While the vulnerability is not as serious as Log4j, it does appear to be mobile and potentially widespread. John Bambenek, Principal Threat Hunter at Netenrich, explains, "Unfortunately, there is no way to know exactly how many installations are vulnerable, and this is likely the kind of vulnerability that automated vulnerability scanners will miss. Enterprises will have to go into the configuration files of every Cassandra instance to determine what their risk is."