Apache HBase Man in the Middle Vulnerability

2013.08.25
Credit: Kyle & Aaron
Risk: Medium
Local: No
Remote: Yes
CWE: N/A


Ogólna skala CVSS: 4.3/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 3.2/10
Wymagany dostęp: Sieć lokalna
Złożoność ataku: Wysoka
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

CVE-2013-2193: Apache HBase Man in the Middle Vulnerability Severity: Severe Vendor: The Apache Software Foundation Versions Affected: All versions of HBase 0.92.x prior to 0.92.3. All versions of HBase 0.94.x prior to 0.94.9. Users affected: Users who have enabled HBase's Kerberos security features and who run HBase co-located on a cluster with Hadoop MapReduce or Hadoop YARN. Impact: RPC traffic from clients to Region Servers may be intercepted by a malicious user with access to run tasks or containers on a cluster. Description: The Apache HBase RPC protocol is intended to provide bidirectional authentication between clients and servers. However, a malicious server or network attacker can unilaterally disable these authentication checks. This allows for potential reduction in the configured quality of protection of the RPC traffic, and privilege escalation if authentication credentials are passed over RPC. Mitigation: Users of HBase 0.92.x versions prior to 0.92.3 should immediately upgrade to 0.92.3 when it becomes available, or to 0.94.9 or later. Users of HBase 0.94.x versions prior to 0.94.9 should immediately upgrade to 0.94.9 or later. Credit: This issue was discovered by Kyle Leckie of Microsoft and Aaron T. Myers of Cloudera.

Referencje:

http://seclists.org/fulldisclosure/2013/Aug/250


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top