CVE-2019-18823

HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)
References
Link Resource
https://lists.debian.org/debian-lts-announce/2021/08/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EOTJJOSMYKXIYXWSG3H4KN332EDSEB6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5YCZXYS67MLJSHR4OLSWVHBE6PZJSB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMPZ7XPOPA4JGAQAUJ4K7JV653DSCIDK/
https://research.cs.wisc.edu/htcondor/ Product
https://research.cs.wisc.edu/htcondor/new.html Release Notes Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001.html Mitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002.html Mitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003.html Mitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004.html Vendor Advisory
https://www.debian.org/security/2022/dsa-5144 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EOTJJOSMYKXIYXWSG3H4KN332EDSEB6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5YCZXYS67MLJSHR4OLSWVHBE6PZJSB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMPZ7XPOPA4JGAQAUJ4K7JV653DSCIDK/
https://research.cs.wisc.edu/htcondor/ Product
https://research.cs.wisc.edu/htcondor/new.html Release Notes Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001.html Mitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002.html Mitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003.html Mitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004.html Vendor Advisory
https://www.debian.org/security/2022/dsa-5144 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*
cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-04-27 15:15

Updated : 2024-11-21 04:33


NVD link : CVE-2019-18823

Mitre link : CVE-2019-18823

CVE.ORG link : CVE-2019-18823


JSON object : View

Products Affected

wisc

  • htcondor

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-287

Improper Authentication