VYPR
High severityNVD Advisory· Published Apr 3, 2015· Updated May 6, 2026

CVE-2015-0225

CVE-2015-0225

Description

The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.cassandra:apache-cassandraMaven
>= 1.2.0, < 2.0.142.0.14
org.apache.cassandra:apache-cassandraMaven
>= 2.1.0, < 2.1.42.1.4

Affected products

38
  • Apache/Cassandra38 versions
    cpe:2.3:a:apache:cassandra:1.2.0:*:*:*:*:*:*:*+ 37 more
    • cpe:2.3:a:apache:cassandra:1.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.13:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.14:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.15:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.16:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.17:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.18:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.19:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:1.2.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:cassandra:2.1.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.