Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <eb6516d2-82f7-481d-f2a4-f7053c05c67f@apache.org>
Date: Thu, 04 May 2023 20:59:50 +0000
From: Madhan Neethiraj <madhan@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-45048: Apache Ranger: code execution vulnerability in
 policy expressions 

Affected versions:

- Apache Ranger 2.3.0

Description:

Authenticated users with appropriate privileges can create policies having expressions that can exploit code execution vulnerability. This issue affects Apache Ranger: 2.3.0.

Credit:

g1831767442@....com (finder)

References:

https://ranger.apache.org/
https://www.cve.org/CVERecord?id=CVE-2022-45048

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.