
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Databricks JDBC Driver before version 2.6.40 contains a vulnerability (CVE-2024-49194) that could potentially allow remote code execution (RCE) by triggering a JNDI injection via a JDBC URL parameter. The vulnerability was discovered by the Alibaba Cloud Intelligence Security Team and was reported through the Databricks bug bounty program. It has been assigned a CVSSv3.1 score of 7.3 (High severity) (Databricks KB, NVD).
The vulnerability stems from improper handling of the krbJAASFile parameter within the JDBC driver. An attacker could potentially achieve Remote Code Execution in the context of the driver by tricking a victim into using a specially crafted connection URL that utilizes the property krbJAASFile. The vulnerability has been assigned a CVSSv3.1 base score of 7.3, indicating high severity (Security Online, ASEC).
If successfully exploited, the vulnerability allows attackers to execute arbitrary code remotely in the context of the JDBC driver. This could potentially lead to unauthorized access and control over affected systems running the vulnerable versions of the Databricks JDBC Driver (Security Online).
Databricks has released version 2.6.40 of the JDBC driver which patches this vulnerability. All current versions of Databricks Runtime on Databricks compute and serverless compute have been patched. For users unable to update immediately, a temporary workaround involves updating the JVM configuration to prevent arbitrary deserialization via JNDI by setting com.sun.jndi.ldap.object.trustURLCodebase and com.sun.jndi.ldap.object.trustSerialData to false (Databricks KB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”