CVE-2023-50380

XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*

History

13 Feb 2025, 18:15

Type Values Removed Values Added
Summary (en) XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges. (en) XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.

28 Jan 2025, 17:44

Type Values Removed Values Added
First Time Apache ambari
Apache
CPE cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2024/02/27/6 - () http://www.openwall.com/lists/oss-security/2024/02/27/6 - Mailing List
References () https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32 - () https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

Information

Published : 2024-02-27 17:15

Updated : 2025-03-27 20:15


NVD link : CVE-2023-50380

Mitre link : CVE-2023-50380

CVE.ORG link : CVE-2023-50380


JSON object : View

Products Affected

apache

  • ambari
CWE
CWE-611

Improper Restriction of XML External Entity Reference