XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue.
More Details:
Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation.
This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/02/27/6 | Mailing List |
https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/02/27/6 | Mailing List |
https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32 | Vendor Advisory |
Configurations
History
13 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges. |
28 Jan 2025, 17:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache ambari
Apache |
|
CPE | cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:* | |
References | () http://www.openwall.com/lists/oss-security/2024/02/27/6 - Mailing List | |
References | () https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Information
Published : 2024-02-27 17:15
Updated : 2025-03-27 20:15
NVD link : CVE-2023-50380
Mitre link : CVE-2023-50380
CVE.ORG link : CVE-2023-50380
JSON object : View
Products Affected
apache
- ambari
CWE
CWE-611
Improper Restriction of XML External Entity Reference