[MAVEN:GHSA-RHH9-CM65-3W54] Improper Authentication in Apache Hadoop
Severity
High
Affected Packages
3
Fixed Packages
3
CVEs
1
In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled.
Package | Affected Version |
---|---|
pkg:maven/org.apache.hadoop/hadoop-main | >= 2.8.0, <= 2.8.5 |
pkg:maven/org.apache.hadoop/hadoop-main | >= 2.9.0, <= 2.9.2 |
pkg:maven/org.apache.hadoop/hadoop-main | >= 3.0.0-alpha2, <= 3.0.0 |
Package | Fixed Version |
---|---|
pkg:maven/org.apache.hadoop/hadoop-main | = 2.8.6 |
pkg:maven/org.apache.hadoop/hadoop-main | = 2.9.3 |
pkg:maven/org.apache.hadoop/hadoop-main | = 3.0.1 |
- ID
- MAVEN:GHSA-RHH9-CM65-3W54
- Severity
- high
- URL
- https://github.com/advisories/GHSA-rhh9-cm65-3w54
- Published
-
2021-04-30T17:29:30
(3 years ago) - Modified
-
2023-02-01T05:05:27
(19 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.apache.hadoop/hadoop-main | org.apache.hadoop | hadoop-main | >= 2.8.0 <= 2.8.5 | |||
Fixed | pkg:maven/org.apache.hadoop/hadoop-main | org.apache.hadoop | hadoop-main | = 2.8.6 | |||
Affected | pkg:maven/org.apache.hadoop/hadoop-main | org.apache.hadoop | hadoop-main | >= 2.9.0 <= 2.9.2 | |||
Fixed | pkg:maven/org.apache.hadoop/hadoop-main | org.apache.hadoop | hadoop-main | = 2.9.3 | |||
Affected | pkg:maven/org.apache.hadoop/hadoop-main | org.apache.hadoop | hadoop-main | >= 3.0.0-alpha2 <= 3.0.0 | |||
Fixed | pkg:maven/org.apache.hadoop/hadoop-main | org.apache.hadoop | hadoop-main | = 3.0.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |