プラットフォーム
java
コンポーネント
org.apache.druid.extensions:druid-basic-security
修正版
36.0.0
36.0.0
CVE-2026-23906 describes an authentication bypass vulnerability affecting Apache Druid. This flaw allows unauthorized access to Druid resources if specific conditions are met. The vulnerability impacts versions 0.17.0 through 35.x. A fix is available in version 36.0.0.
An attacker can exploit this vulnerability to gain unauthorized access to sensitive data and perform actions within the Druid cluster without proper authentication. This could involve data exfiltration, modification of data, or even complete control of the Druid system. The prerequisite for exploitation is that the druid-basic-security extension is enabled, LDAP authentication is configured, and the underlying LDAP server permits anonymous binds. This combination of factors creates a significant attack surface, potentially allowing attackers to bypass security controls entirely. The impact is particularly severe given Druid's use in handling large volumes of data, often containing sensitive information.
This vulnerability was publicly disclosed on 2026-02-10. The CVSS score of 9.5 (CRITICAL) reflects the high severity of the vulnerability. No public proof-of-concept (PoC) code has been publicly released at the time of writing, but the ease of exploitation given the prerequisites suggests a high likelihood of exploitation if a PoC is developed. It is not currently listed on CISA KEV.
Organizations using Apache Druid for data analytics, particularly those relying on LDAP authentication and the druid-basic-security extension, are at risk. Shared hosting environments where multiple Druid instances share the same LDAP server are especially vulnerable, as a compromise of one instance could potentially impact others.
• linux / server: Monitor Druid logs for authentication attempts without valid credentials. Use journalctl -u druid to filter for authentication failures.
journalctl -u druid | grep "Authentication failed" • java / platform: Inspect Druid's security configuration files to ensure druid-basic-security is enabled and LDAP authentication is configured. Check LDAP server logs for anonymous bind attempts.
• generic web: Attempt to access Druid endpoints without authentication. If the LDAP server allows anonymous binds, authentication should fail, not succeed.
disclosure
エクスプロイト状況
EPSS
0.08% (25% パーセンタイル)
The primary mitigation is to upgrade Apache Druid to version 36.0.0 or later, which contains the fix for this vulnerability. If upgrading immediately is not feasible, consider temporarily disabling the druid-basic-security extension, but be aware this will remove all security features provided by the extension. As a secondary measure, restrict anonymous binds on the LDAP server to prevent attackers from leveraging this bypass. Regularly review LDAP configuration to ensure adherence to security best practices. After upgrading, confirm the fix by attempting to authenticate without valid credentials and verifying that authentication fails.
Deshabilite el enlace anónimo en su servidor LDAP. Actualice Apache Druid a la versión 36.0.0 o posterior, que incluye correcciones para rechazar correctamente los intentos de enlace LDAP anónimos.
脆弱性分析と重要アラートをメールでお届けします。
CVE-2026-23906 is a critical vulnerability in Apache Druid versions 0.17.0 through 35.x that allows attackers to bypass authentication if druid-basic-security is enabled, LDAP is configured, and the LDAP server permits anonymous binds.
You are affected if you are using Apache Druid versions 0.17.0 through 35.0.1 and have the druid-basic-security extension enabled with LDAP authentication and an LDAP server allowing anonymous binds.
Upgrade Apache Druid to version 36.0.0 or later. As a temporary workaround, disable the druid-basic-security extension, but be aware this removes all security features.
While no public exploits are currently known, the ease of exploitation suggests a high likelihood of exploitation if a proof-of-concept is developed.
Refer to the official Apache Druid security advisory for details: [https://druid.apache.org/security/CVE-2026-23906](https://druid.apache.org/security/CVE-2026-23906)
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
pom.xml ファイルをアップロードすると、影響の有無を即座にお知らせします。