CVE-2015-0225:
Improper Neutralization of Special Elements used in a Command in Apache Cassandra
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.74725%
CWE
Published
5/14/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.cassandra:apache-cassandra | maven | >= 1.2.0, < 2.0.14 | 2.0.14 |
org.apache.cassandra:apache-cassandra | maven | >= 2.1.0, < 2.1.4 | 2.1.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure JMX/RMI configuration in Apache Cassandra. The primary entry point for service initialization is CassandraDaemon.start()
, which would handle JMX setup. The JMXServerUtils.createJMXServer()
is directly responsible for JMX server creation. Both would appear in stack traces during exploitation as they handle the vulnerable JMX initialization. The confidence is high for CassandraDaemon.start()
as it's the main service entry point, and medium for JMXServerUtils.createJMXServer()
as its involvement is inferred from JMX-related mitigation documentation.