Miggo Logo

CVE-2018-8016:
Missing Authentication for Critical Function in Apache Cassandra

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.69658%
Published
5/13/2022
Updated
3/4/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.cassandra:cassandra-allmaven>= 3.8, <= 3.11.13.11.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how JMXServerUtils programmatically configured the JMX/RMI server in vulnerable versions. The commit diff shows the patched version removed dependencies on JVM internals and changed how the RMI registry is bound. The original implementation: 1) Used a custom Registry class that bypassed security constraints, 2) Did not properly enforce authentication requirements when binding the 'jmxrmi' endpoint, 3) Relied on internal sun.rmi classes that weakened security controls. The createJMXServer function was directly responsible for setting up the insecure binding configuration, making it the root cause of the authentication bypass.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** ****ult *on*i*ur*tion in *p**** **ss*n*r* *.* t*rou** *.**.* *in*s *n un*ut**nti**t** JMX/RMI int*r**** to *ll n*twork int*r****s, w*i** *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry J*v* *o** vi* *n RMI r*qu*st. T*is issu* is * r**r*ssion o* *V*-

Reasoning

T** vuln*r**ility st*ms *rom *ow JMXS*rv*rUtils pro*r*mm*ti**lly *on*i*ur** t** JMX/RMI s*rv*r in vuln*r**l* v*rsions. T** *ommit *i** s*ows t** p*t**** v*rsion r*mov** **p*n**n*i*s on JVM int*rn*ls *n* ***n*** *ow t** RMI r**istry is *oun*. T** ori*