Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0cc3cf0e-4b5c-287d-c157-f606d7f15cb2@apache.org>
Date: Tue, 27 Feb 2024 16:42:32 +0000
From: Brahma Reddy Battula <brahma@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-50380: Apache Ambari: authenticated users could perform
 XXE to read arbitrary files on the server 

Severity: important

Affected versions:

- Apache Ambari 2.7.0 through 2.7.7

Description:

XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue.

More Details:

Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation.

This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.

References:

https://ambari.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-50380

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.