High severity7.3NVD Advisory· Published Dec 17, 2024· Updated Apr 15, 2026
CVE-2024-49194
CVE-2024-49194
Description
Databricks JDBC Driver 2.x before 2.6.40 could potentially allow remote code execution (RCE) by triggering a JNDI injection via a JDBC URL parameter. The vulnerability is rooted in the improper handling of the krbJAASFile parameter. An attacker could potentially exploit this vulnerability to achieve Remote Code Execution in the context of the driver by tricking a victim into using a crafted connection URL that uses the property krbJAASFile.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.databricks:databricks-jdbcMaven | >= 2.0, < 2.6.40 | 2.6.40 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-jxw2-jvxf-5vrpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-49194ghsaADVISORY
- kb.databricks.com/en_US/data-sources/security-bulletin-databricks-jdbc-driver-vulnerability-advisory-cve-2024-49194ghsaWEB
- kb.databricks.com/en_US/data-sources/security-bulletin-databricks-jdbc-driver-vulnerability-advisory-cve-2024-49194nvd
News mentions
0No linked articles in our index yet.