// For flags

CVE-2023-50380

Apache Ambari: authenticated users could perform XXE to read arbitrary files on the server

Severity Score

"-"
*CVSS v-

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue.

More Details:

Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation.

This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.

Inyección de entidad externa XML en versiones de Apache Ambari &lt;= 2.7.7. Se recomienda a los usuarios actualizar a la versión 2.7.8, que soluciona este problema. Más detalles: Oozie Workflow Scheduler tenía una vulnerabilidad que permitía la lectura de archivos a nivel raíz y la escalada de privilegios de usuarios con pocos privilegios. La vulnerabilidad se debió a la falta de una validación adecuada de la entrada del usuario. Esta vulnerabilidad se conoce como ataque de inyección de entidad externa XML (XXE). Los atacantes pueden aprovechar las vulnerabilidades de XXE para leer archivos arbitrarios en el servidor, incluidos archivos confidenciales del sistema. En teoría, podría ser posible utilizar esto para aumentar los privilegios.

*Credits: N/A
CVSS Scores
Attack Vector
-
Attack Complexity
-
Privileges Required
-
User Interaction
-
Scope
-
Confidentiality
-
Integrity
-
Availability
-
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-12-07 CVE Reserved
  • 2024-02-27 CVE Published
  • 2024-02-28 EPSS Updated
  • 2024-08-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache Software Foundation
Search vendor "Apache Software Foundation"
Apache Ambari
Search vendor "Apache Software Foundation" for product "Apache Ambari"
>= 2.7.0 <= 2.7.7
Search vendor "Apache Software Foundation" for product "Apache Ambari" and version " >= 2.7.0 <= 2.7.7"
en
Affected