RSS   Vulnerabilities for 'Htcondor'   RSS

2022-04-06
 
CVE-2021-45103

CWE-532
 

 
An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.

 
 
CVE-2021-45104

CWE-326
 

 
An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.

 
 
CVE-2022-26110

NVD-CWE-noinfo
 

 
An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.

 
2021-12-16
 
CVE-2021-45101

CWE-668
 

 
An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.

 
 
CVE-2021-45102

CWE-863
 

 
An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.

 
2021-01-27
 
CVE-2021-25312

CWE-306
 

 
HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.

 
2020-01-31
 
CVE-2014-8126

CWE-20
 

 
The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code.

 
2020-01-09
 
CVE-2012-3490

NVD-CWE-noinfo
 

 
The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

 

 >>> Vendor: WISC 2 Products
Condor
Htcondor


Copyright 2024, cxsecurity.com

 

Back to Top