Summary: A critical vulnerability (CVE-2024-49194) in the Databricks JDBC Driver allows for remote code execution through JNDI injection, affecting versions 2.6.38 and below. Security researchers have highlighted the urgency of updating to patched versions to mitigate potential attacks.
Threat Actor: Unknown | unknown
Victim: Databricks | Databricks
Key Point :
- Vulnerability CVE-2024-49194 has a CVSSv3.1 score of 7.3, indicating high severity.
- The flaw is due to improper handling of the krbJAASFile parameter, allowing JNDI injection.
- Databricks has released a patch in version 2.6.40 and above; users are urged to update immediately.
- A temporary mitigation involves adjusting JVM configurations to prevent arbitrary deserialization.
- Security researcher pyn3rd has created a proof-of-concept exploit to demonstrate the vulnerability’s impact.
A newly discovered vulnerability in the Databricks JDBC Driver (CVE-2024-49194) could allow attackers to remotely execute code on vulnerable systems. The flaw, found by security researchers at Alibaba Cloud Intelligence Security Team, carries a high severity rating (CVSSv3.1 score of 7.3) and affects driver versions 2.6.38 and below.
The vulnerability stems from improper handling of the krbJAASFile parameter within the driver. By manipulating this parameter within a specially crafted connection URL, attackers can trigger a JNDI injection, ultimately leading to remote code execution within the context of the driver.
Security researcher pyn3rd also contributed by creating a proof-of-concept (PoC) exploit, further emphasizing the potential impact of the CVE-2024-49194 flaw.
Databricks has acted swiftly to address the issue, patching the vulnerability in driver version 2.6.40 and above. All current versions of Databricks Runtime on Databricks compute and serverless compute are already protected. However, users running older versions of the JDBC driver on their local machines are urged to update immediately.
For those unable to immediately update their JDBC driver, Databricks recommends updating the JVM configuration to prevent arbitrary deserialization via JNDI. This can be achieved by setting the following configuration values to false:
- com.sun.jndi.ldap.object.trustURLCodebase
- com.sun.jndi.ldap.object.trustSerialData
This workaround provides a temporary mitigation until the driver can be updated.