CVE-2024-49194
Java vulnerability analysis and mitigation

Overview

Databricks JDBC Driver before version 2.6.40 contains a vulnerability (CVE-2024-49194) that could potentially allow remote code execution (RCE) by triggering a JNDI injection via a JDBC URL parameter. The vulnerability was discovered by the Alibaba Cloud Intelligence Security Team and was reported through the Databricks bug bounty program. It has been assigned a CVSSv3.1 score of 7.3 (High severity) (Databricks KB, NVD).

Technical details

The vulnerability stems from improper handling of the krbJAASFile parameter within the JDBC driver. An attacker could potentially achieve Remote Code Execution in the context of the driver by tricking a victim into using a specially crafted connection URL that utilizes the property krbJAASFile. The vulnerability has been assigned a CVSSv3.1 base score of 7.3, indicating high severity (Security Online, ASEC).

Impact

If successfully exploited, the vulnerability allows attackers to execute arbitrary code remotely in the context of the JDBC driver. This could potentially lead to unauthorized access and control over affected systems running the vulnerable versions of the Databricks JDBC Driver (Security Online).

Mitigation and workarounds

Databricks has released version 2.6.40 of the JDBC driver which patches this vulnerability. All current versions of Databricks Runtime on Databricks compute and serverless compute have been patched. For users unable to update immediately, a temporary workaround involves updating the JVM configuration to prevent arbitrary deserialization via JNDI by setting com.sun.jndi.ldap.object.trustURLCodebase and com.sun.jndi.ldap.object.trustSerialData to false (Databricks KB).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management