CVE-2020-9492
hadoop: WebHDFS client might send SPNEGO authorization header
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
En Apache Hadoop versiones 3.2.0 hasta 3.2.1, versiones 3.0.0-alpha1 hasta 3.1.3 y versiones 2.0.0-alpha hasta 2.10.0, el cliente WebHDFS puede enviar el encabezado de autorizaciĆ³n SPNEGO hacia una URL remota sin la comprobaciĆ³n apropiada
A flaw was found in Apache hadoop. The WebHDFS client can send a SPNEGO authorization header to a remote URL without proper verification which could lead to an access restriction bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A minor version update is now available for Red Hat Camel K that includes CVE fixes in the base images, which are documented in the Release Notes document linked in the References section. Issues addressed include denial of service, information leakage, integer overflow, and resource exhaustion vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-01 CVE Reserved
- 2021-01-26 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-863: Incorrect Authorization
CAPEC
References (18)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpujul2022.html | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Hadoop Search vendor "Apache" for product "Hadoop" | >= 2.0.0 <= 2.10.0 Search vendor "Apache" for product "Hadoop" and version " >= 2.0.0 <= 2.10.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Hadoop Search vendor "Apache" for product "Hadoop" | >= 3.0.0 <= 3.1.3 Search vendor "Apache" for product "Hadoop" and version " >= 3.0.0 <= 3.1.3" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Hadoop Search vendor "Apache" for product "Hadoop" | >= 3.2.0 <= 3.2.1 Search vendor "Apache" for product "Hadoop" and version " >= 3.2.0 <= 3.2.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 8.6.0 Search vendor "Apache" for product "Solr" and version "8.6.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 8.6.2 Search vendor "Apache" for product "Solr" and version "8.6.2" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Financial Services Crime And Compliance Management Studio Search vendor "Oracle" for product "Financial Services Crime And Compliance Management Studio" | 8.0.8.2.0 Search vendor "Oracle" for product "Financial Services Crime And Compliance Management Studio" and version "8.0.8.2.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Financial Services Crime And Compliance Management Studio Search vendor "Oracle" for product "Financial Services Crime And Compliance Management Studio" | 8.0.8.3.0 Search vendor "Oracle" for product "Financial Services Crime And Compliance Management Studio" and version "8.0.8.3.0" | - |
Affected
|