ghsa-2xcr-p767-f3rv
Vulnerability from github
5.8 (Medium) - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N
Severity: medium (5.8) / important
Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Druid.
This issue affects all previous Druid versions.
When using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid's out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected.
Users are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.druid:druid" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "31.0.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.druid:druid" }, "ranges": [ { "events": [ { "introduced": "32.0.0" }, { "fixed": "32.0.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "32.0.0" ] } ], "aliases": [ "CVE-2025-27888" ], "database_specific": { "cwe_ids": [ "CWE-601", "CWE-79", "CWE-918" ], "github_reviewed": true, "github_reviewed_at": "2025-03-21T22:46:39Z", "nvd_published_at": "2025-03-20T12:15:14Z", "severity": "MODERATE" }, "details": "Severity: medium (5.8) / important\n\nServer-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027),\u00a0URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Apache Druid.\n\nThis issue affects all previous Druid versions.\n\nWhen using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid\u0027s out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected.\n\nUsers are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue.", "id": "GHSA-2xcr-p767-f3rv", "modified": "2025-07-15T00:32:25Z", "published": "2025-03-20T12:32:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27888" }, { "type": "PACKAGE", "url": "https://github.com/apache/druid" }, { "type": "WEB", "url": "https://github.com/apache/druid/releases/tag/druid-31.0.2" }, { "type": "WEB", "url": "https://github.com/apache/druid/releases/tag/druid-32.0.1" }, { "type": "WEB", "url": "https://lists.apache.org/thread/c0qo989pwtrqkjv6xfr0c30dnjq8vf39" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/03/19/7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N", "type": "CVSS_V4" } ], "summary": "Apache Druid vulnerable to Server-Side Request Forgery, Cross-site Scripting, Open Redirect" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.