vendor:
Cassandra Web
by:
Jeremy Brown
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Cassandra Web
Affected Version From: 0.5.0
Affected Version To: 0.5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:avalanche123:cassandra-web:0.5.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2020
Cassandra Web 0.5.0 – Remote File Read
Cassandra Web is vulnerable to directory traversal due to the disabled Rack::Protection module. Apache Cassandra credentials are passed via the CLI in order for the server to auth to it and provide the web access, so they are also one thing that can be captured via the arbitrary file read.
Mitigation:
Fixed in github repo and v0.6.0 / ruby-gems when available. It is still recommended to containerize / run this in some sandbox, apparmor, etc.