Cloudera Manager 7.2.4 has Incorrect Access Control, allowing Escalation of Privileges to view the restricted Dashboard.
Max CVSS
5.3
EPSS Score
0.07%
Published
2021-11-08
Updated
2022-07-12
Cloudera Manager 5.x, 6.x, 7.1.x, 7.2.x, and 7.3.x allows XSS via the path parameter.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-11-08
Updated
2021-11-10
Cloudera Hue 4.6.0 allows XSS via the type parameter.
Max CVSS
6.1
EPSS Score
0.07%
Published
2021-11-08
Updated
2021-11-09
Cloudera Manager 7.2.4 has Incorrect Access Control, allowing Escalation of Privileges.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-11-08
Updated
2022-07-12
Cloudera Hue 4.6.0 allows XSS.
Max CVSS
6.1
EPSS Score
0.09%
Published
2021-11-08
Updated
2021-11-09
Cloudera Manager 5.x, 6.x, 7.1.x, 7.2.x, and 7.3.x allows XSS.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-11-08
Updated
2021-11-10
In Cloudera Data Engineering (CDE) 1.3.0, JWT authentication tokens are exposed to administrators in virtual cluster server logs.
Max CVSS
6.5
EPSS Score
0.09%
Published
2021-03-15
Updated
2022-06-28
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
Max CVSS
8.8
EPSS Score
0.07%
Published
2020-11-26
Updated
2020-12-01
An issue was discovered in Cloudera Manager 5.x before 5.16.2, 6.0.x before 6.0.2, and 6.1.x before 6.1.1. Malicious impala queries can result in Cross Site Scripting (XSS) when viewed within this product.
Max CVSS
5.4
EPSS Score
0.05%
Published
2019-11-26
Updated
2019-12-05
An issue was discovered in Cloudera Hue 6.0.0 through 6.1.0. When using one of following authentication backends: LdapBackend, PamBackend, SpnegoDjangoBackend, RemoteUserDjangoBackend, SAML2Backend, OpenIDBackend, or OAuthBackend, external users are created with superuser privileges.
Max CVSS
8.3
EPSS Score
0.08%
Published
2019-11-26
Updated
2020-08-24
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.
Max CVSS
9.9
EPSS Score
0.08%
Published
2019-06-07
Updated
2019-06-10
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. Authenticated users can bypass project permission checks and gain read-write access to any project folder.
Max CVSS
8.3
EPSS Score
0.09%
Published
2019-11-26
Updated
2019-12-12
Cloudera CDH has Insecure Permissions because ALL cannot be revoked.This affects 5.x through 5.15.1 and 6.x through 6.0.1.
Max CVSS
7.2
EPSS Score
0.10%
Published
2019-11-26
Updated
2019-12-12
An issue was discovered in Cloudera Manager 5.x through 5.15.0. One type of page in Cloudera Manager uses a 'returnUrl' parameter to redirect the user to another page in Cloudera Manager once a wizard is completed. The validity of this parameter was not checked. As a result, the user could be automatically redirected to an attacker's external site or perform a malicious JavaScript function that results in cross-site scripting (XSS). This was fixed by not allowing any value in the returnUrl parameter with patterns such as http://, https://, //, or javascript. The only exceptions to this rule are the SAML Login/Logout URLs, which remain supported since they are explicitly configured and they are not passed via the returnUrl parameter.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-06-20
Updated
2020-08-13
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.2.x through 1.4.0. Unauthenticated users can get a list of user accounts.
Max CVSS
5.3
EPSS Score
0.10%
Published
2019-06-21
Updated
2019-06-21
Cloudera Manager through 5.15 has Incorrect Access Control.
Max CVSS
8.1
EPSS Score
0.29%
Published
2019-07-11
Updated
2019-07-18
Remote code execution is possible in Cloudera Data Science Workbench version 1.3.0 and prior releases via unspecified attack vectors.
Max CVSS
9.8
EPSS Score
0.68%
Published
2019-07-03
Updated
2020-08-24
An issue was discovered in Cloudera Manager before 5.13.4, 5.14.x before 5.14.4, and 5.15.x before 5.15.1. A read-only user can access sensitive cluster information.
Max CVSS
6.5
EPSS Score
0.07%
Published
2019-05-24
Updated
2019-05-28
In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.
Max CVSS
5.5
EPSS Score
0.05%
Published
2019-06-07
Updated
2019-06-11
This CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-06-07
Updated
2019-06-10
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.x before 1.2.0. Several web application vulnerabilities allow malicious authenticated users of CDSW to escalate privileges in CDSW. CDSW users can exploit these vulnerabilities in combination to gain root access to CDSW nodes, gain access to the CDSW database which includes Kerberos keytabs of CDSW users and bcrypt hashed passwords, and gain access to other privileged information such as session tokens, invitation tokens, and environment variables.
Max CVSS
8.8
EPSS Score
0.10%
Published
2018-02-05
Updated
2019-10-03
Secret data of processes managed by CM is not secured by file permissions.
Max CVSS
6.5
EPSS Score
0.07%
Published
2019-07-03
Updated
2019-07-11
The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed.
Max CVSS
7.5
EPSS Score
0.10%
Published
2019-07-03
Updated
2019-07-11
The provided secure solrconfig.xml sample configuration does not enforce Sentry authorization on /update/json/docs.
Max CVSS
7.5
EPSS Score
0.08%
Published
2019-07-03
Updated
2019-07-11
Cloudera Manager 5.8.x before 5.8.5, 5.9.x before 5.9.2, and 5.10.x before 5.10.1 allows a read-only Cloudera Manager user to discover the usernames of other users and elevate the privileges of those users.
Max CVSS
8.8
EPSS Score
0.10%
Published
2019-11-26
Updated
2019-12-04
50 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!