CVE-2023-50380
Apache Ambari: authenticated users could perform XXE to read arbitrary files on the server
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue.
More Details:
Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation.
This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.
Inyección de entidad externa XML en versiones de Apache Ambari <= 2.7.7. Se recomienda a los usuarios actualizar a la versión 2.7.8, que soluciona este problema. Más detalles: Oozie Workflow Scheduler tenía una vulnerabilidad que permitía la lectura de archivos a nivel raíz y la escalada de privilegios de usuarios con pocos privilegios. La vulnerabilidad se debió a la falta de una validación adecuada de la entrada del usuario. Esta vulnerabilidad se conoce como ataque de inyección de entidad externa XML (XXE). Los atacantes pueden aprovechar las vulnerabilidades de XXE para leer archivos arbitrarios en el servidor, incluidos archivos confidenciales del sistema. En teoría, podría ser posible utilizar esto para aumentar los privilegios.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-12-07 CVE Reserved
- 2024-02-27 CVE Published
- 2024-02-28 EPSS Updated
- 2024-08-15 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2024/02/27/6 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32 | 2024-02-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Software Foundation Search vendor "Apache Software Foundation" | Apache Ambari Search vendor "Apache Software Foundation" for product "Apache Ambari" | >= 2.7.0 <= 2.7.7 Search vendor "Apache Software Foundation" for product "Apache Ambari" and version " >= 2.7.0 <= 2.7.7" | en |
Affected
|