You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cassandra.apache.org by "Abhishek Singh (Jira)" <ji...@apache.org> on 2019/11/13 09:32:00 UTC

[jira] [Created] (CASSANDRA-15422) CVE-2018-1320(The libthrift component is vulnerable to Improper Access Control) on Cassendra 3.11.4

Abhishek Singh created CASSANDRA-15422:
------------------------------------------

             Summary: CVE-2018-1320(The libthrift component is vulnerable to Improper Access Control) on Cassendra 3.11.4
                 Key: CASSANDRA-15422
                 URL: https://issues.apache.org/jira/browse/CASSANDRA-15422
             Project: Cassandra
          Issue Type: Bug
            Reporter: Abhishek Singh


*Description :**Description :* *Severity :* CVE CVSS 3: 7.5Sonatype CVSS 3: 8.2
 
 *Weakness :* CVE CWE: 20
 
 *Source :* National Vulnerability Database
 
 *Categories :* Data 
 *Description from CVE :* Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.
 
 *Explanation :* The libthrift component is vulnerable to Improper Access Control. The open[] method of the TSaslTransport class incorrectly uses an assertion to validate whether or not the SASL handshake has successfully completed. In some cases, such as production builds, the assertion functionality can be disabled rendering the validation incomplete. In such a case, an attacker can exploit this by being able to login without actually successfully completing the SASL handshake. 
 *Detection :* The application is vulnerable by using this component. 
 *Recommendation :* We recommend upgrading to a version of this component that is not vulnerable to this specific issue. 
 *Root Cause :* apache-cassandra-3.11.4-bin.tar.gzorg/apache/thrift/transport/TSaslTransport.class : [0.5.0, 0.12.0]
 
 *Advisories :* Project: https://lists.apache.org/thread.html/da5234b5e78f1c99190407f…
 
 *CVSS Details :* CVE CVSS 3: 7.5CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
*Occurences (Paths) :* ["apache-cassandra.zip" ; "apache-cassandra.zip"]
*CVE :* CVE-2018-1320
*URL :* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1320
*Remediation :* This component does not have any non-vulnerable Version. Please contact the vendor to get this vulnerability fixed.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@cassandra.apache.org
For additional commands, e-mail: commits-help@cassandra.apache.org