Apache HBase Man in the Middle Vulnerability

2013.08.25
Credit: Kyle & Aaron
Risk: Medium
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 4.3/10
Impact Subscore: 6.4/10
Exploitability Subscore: 3.2/10
Exploit range: Adjacent network
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

CVE-2013-2193: Apache HBase Man in the Middle Vulnerability Severity: Severe Vendor: The Apache Software Foundation Versions Affected: All versions of HBase 0.92.x prior to 0.92.3. All versions of HBase 0.94.x prior to 0.94.9. Users affected: Users who have enabled HBase's Kerberos security features and who run HBase co-located on a cluster with Hadoop MapReduce or Hadoop YARN. Impact: RPC traffic from clients to Region Servers may be intercepted by a malicious user with access to run tasks or containers on a cluster. Description: The Apache HBase RPC protocol is intended to provide bidirectional authentication between clients and servers. However, a malicious server or network attacker can unilaterally disable these authentication checks. This allows for potential reduction in the configured quality of protection of the RPC traffic, and privilege escalation if authentication credentials are passed over RPC. Mitigation: Users of HBase 0.92.x versions prior to 0.92.3 should immediately upgrade to 0.92.3 when it becomes available, or to 0.94.9 or later. Users of HBase 0.94.x versions prior to 0.94.9 should immediately upgrade to 0.94.9 or later. Credit: This issue was discovered by Kyle Leckie of Microsoft and Aaron T. Myers of Cloudera.

References:

http://seclists.org/fulldisclosure/2013/Aug/250


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top