|
|
Message-ID: <CACRbFyjtT7QQGHUzTRdbJoySbJb7tt4BDk5-r-VRn0GB0Kgvag@mail.gmail.com>
Date: Fri, 26 May 2017 14:26:44 -0400
From: larry mccay <lmccay@...che.org>
To: user@...x.apache.org, dev@...x.apache.org, security <security@...che.org>,
"<security@...oop.apache.org>" <security@...oop.apache.org>, announce@...che.org, private@...x.apache.org
Cc: oss-security@...ts.openwall.com, bugtraq@...urityfocus.com
Subject: [ANNOUNCE] CVE-2017-5646: Apache Knox Impersonation Issue for WebHDFS
CVE-2017-5646: Apache Knox Impersonation Issue for WebHDFS
Severity: Important
Vendor:
The Apache Software Foundation
Versions Affected:
All versions of Apache Knox prior to 0.12.0
An authenticated user may use a specially crafted URL to impersonate another
user while accessing WebHDFS through Apache Knox. This may result in
escalated
privileges and unauthorized data access. While this activity is audit logged
and can be easily associated with the authenticated user, this is still a
serious security issue.
Mitigation:
All users are recommended to upgrade to Apache Knox 0.12.0,
where validation, scrubbing and logging of such attempts has been added.
The Apache Knox 0.12.0 release can be downloaded from:
Source: http://www.apache.org/dyn/closer.cgi/knox/0.12.0/knox-0.12.0-src.zip
Binary: http://www.apache.org/dyn/closer.cgi/knox/0.12.0/knox-0.12.0.zip
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.