Page 2 of 11 results (0.005 seconds)

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root. La función condor_credd en HTCondor versiones anteriores a 8.9.11, permite el Salto de Directorio fuera del directorio SEC_CREDENTIAL_DIRECTORY_OAUTH, como es demostrado mediante la creación de un archivo bajo /etc que luego será ejecutado por root • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0002.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method. HTCondor versiones anteriores a 8.9.11, permite a un usuario enviar un trabajo como otro usuario en el sistema, debido a un fallo en el método de autenticación IDTOKENS • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0001.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs) HTCondor versiones hasta e incluyendo una serie estable 8.8.6 y la serie de desarrollo 8.9.4, tiene un Control de Acceso Incorrecto. Es posible usar un método de autenticación diferente para enviar un trabajo que el administrador ha especificado. • https://lists.debian.org/debian-lts-announce/2021/08/msg00000.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EOTJJOSMYKXIYXWSG3H4KN332EDSEB6 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5YCZXYS67MLJSHR4OLSWVHBE6PZJSB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMPZ7XPOPA4JGAQAUJ4K7JV653DSCIDK https://research.cs.wisc.edu/htcondor https://research.cs.wisc.edu/htcondor/new.html https:/ • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors. Las funciones (1) my_popenv_impl y (2) my_spawnv en el archivo src/condor_utils/my_popen.cpp y la función (3) systemCommand en el archivo condor_vm-gahp/vmgahp_common.cpp en Condor versiones 7.6.x anteriores a 7.6.10 y versiones 7.8.x anteriores a 7.8.4 no comprueba apropiadamente el valor de retorno de las llamadas de setuid, lo que puede causar que un subproceso o hilo sea creado con privilegios root y permitir a atacantes remotos obtener privilegios por medio de vectores no especificados. • http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=94e84ce4 http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html http://www.openwall.com/lists/oss-security/2012/09/20/9 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3490 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions. El componente condor_schedd en HTCondor en versiones anteriores a la 8.6.8 y versiones 8.7.x anteriores a la 8.7.5 permite que usuarios autenticados remotos provoquen una denegación de servicio (cierre inesperado del demonio) aprovechando el uso de las extensiones GSI y VOMS. • http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml • CWE-20: Improper Input Validation •