Page 2 of 12 results (0.001 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons. Apache Storm en versiones 1.0.6 y anteriores, 1.2.1 y anteriores y versiones 1.1.2 y anteriores expone una vulnerabilidad que podría permitir que un usuario suplante a otro al comunicarse con algunos demonios Storm. Apache Syncope version 2.7 suffers from a remote code execution vulnerability. • http://www.securityfocus.com/bid/104399 https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4%40%3Cdev.storm.apache.org%3E • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. Apache Storm en versiones 1.0.6 y anteriores, 1.2.1 y anteriores y versiones 1.1.2 y anteriores expone una vulnerabilidad de escritura de archivos arbitrarios, que puede lograrse empleando un archivo zip especialmente m anipulado (afecta también a otros archivos, como bzip2, tar, xz, war, cpio o 7z) que contiene nombres de archivo de salto de directorio. Por lo tanto, cuando el nombre de archivo se concatena al directorio de extracción objetivo, la ruta final acaba fuera de la carpeta objetivo. • http://www.securityfocus.com/bid/104418 https://lists.apache.org/thread.html/613b2fca8bcd0a3b12c0b763ea8f7cf62e422e9f79fce6cfa5b08a58%40%3Cdev.storm.apache.org%3E • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in the log viewer in Apache Storm 0.9.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to log. Una vulnerabilidad de salto de directorio en el visor de registros en Apache Storm 0.9.0.1 permite que atacantes remotos lean archivos arbitrarios mediante un .. (punto punto) en el parámetro file en log. • https://issues.apache.org/jira/browse/STORM-269 https://mail-archives.apache.org/mod_mbox/storm-dev/201404.mbox/%3CJIRA.12704141.1395964296891.201561.1398799995645%40arcas%3E • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

It was found that under some situations and configurations of Apache Storm 1.x before 1.0.4 and 1.1.x before 1.1.1, it is theoretically possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user. In the worst case this could lead to secure credentials of the other user being compromised. **RECHAZADA** NO UTILICE ESTE NÚMERO DE CANDIDATO. ConsultIDs: none. Motivo: Este candidato ha sido retirado por su CNA. • http://www.securityfocus.com/bid/100235 http://www.securitytracker.com/id/1039116 https://lists.apache.org/thread.html/b9125bf507ed6f2ca6e85ba1a4b44e232aa70eeddfba2a9d8a954127%40%3Cdev.storm.apache.org%3E •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 0

The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors. El demonio IU en Apache Storm 0.10.0 en versiones anteriores a 0.10.0-beta1 permite a atacantes remotos ejecutar código arbitrario a través de vectores no especificados.. • http://packetstormsecurity.com/files/132417/Apache-Storm-0.10.0-beta-Code-Execution.html http://www.securityfocus.com/archive/1/535804/100/0/threaded http://www.securitytracker.com/id/1032695 • CWE-264: Permissions, Privileges, and Access Controls •