11 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

06 Apr 2022 — An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon. Se ha detectado un problema en HTCondor versiones 8.8.x anteriores a 8.8.16, versiones 9.0.x anteriores a 9.0.10 y versiones 9.1.x anteriores a 9.6.0. Cuando un usuario es autenticado en un demonio de HTCondor por medio del método CLAIMTOBE, el u... • https://lists.debian.org/debian-lts-announce/2022/04/msg00016.html •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 0

06 Apr 2022 — An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data. Se ha detectado un problema en HTCondor versiones 9.0.x anteriores a 9.0.10 y versiones 9.1.x anteriores a 9.5.1. Un atacante que pueda capturar los datos de red de HTCondor puede interferir con los trabajos y datos de los usuarios • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0006 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

06 Apr 2022 — An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer. Se ha detectado un problema en HTCondor versiones 9.0.x anteriores a 9.0.10 y versiones 9.1.x anteriores a 9.5.1. Un atacante puede acceder a archivos almacenados en el almacenamiento en la nube S3 que un usuario ha pedido a HTCondor que transfiera • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0005 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

16 Dec 2021 — An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow. Se ha detectado un problema en HTCondor versiones 9.0.x anteriores a 9.0.4 y versiones 9.1.x anteriores a 9.1.2. Cuando es autenticado un demonio HTCondor usando un SciToken, un usuario puede recibir autorizaciones más allá de lo que el token debería permitir • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0004 • CWE-863: Incorrect Authorization •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

16 Dec 2021 — An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data. Se ha detectado un problema en HTCondor versiones anteriores a versión 8.8.15, versiones 9.0.x anteriores a 9.0.4 y versiones 9.1.x anteriores a 9.1.2. Usando herramientas de línea de comandos estándar, un usuario c... • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0003 •

CVSS: 9.9EPSS: 2%CPEs: 1EXPL: 0

27 Jan 2021 — condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root. La función condor_credd en HTCondor versiones anteriores a 8.9.11, permite el Salto de Directorio fuera del directorio SEC_CREDENTIAL_DIRECTORY_OAUTH, como es demostrado mediante la creación de un archivo bajo /etc que luego será ejecutado por root • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0002.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Jan 2021 — HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method. HTCondor versiones anteriores a 8.9.11, permite a un usuario enviar un trabajo como otro usuario en el sistema, debido a un fallo en el método de autenticación IDTOKENS • https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0001.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.8EPSS: 1%CPEs: 7EXPL: 0

27 Apr 2020 — HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs) HTCondor versiones hasta e incluyendo una serie estable 8.8.6 y la serie de desarrollo 8.9.4, tiene u... • https://lists.debian.org/debian-lts-announce/2021/08/msg00000.html • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 2%CPEs: 2EXPL: 0

09 Jan 2020 — The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors. Las funciones (1) my_popenv_impl y (2) my_spawnv en el archivo src/condor_utils/my_popen.cpp y la función (3)... • http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=94e84ce4 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

05 Jul 2018 — The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions. El componente condor_schedd en HTCondor en versiones anteriores a la 8.6.8 y versiones 8.7.x anteriores a la 8.7.5 permite que usuarios autenticados remotos provoquen una denegación de servicio (cierre inesperado del demonio) aprovechando el uso de las extensiones GSI y VOMS. • http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html • CWE-20: Improper Input Validation •