You are viewing a plain text version of this content. The canonical link for it is here.
Posted to general@hadoop.apache.org by Akira Ajisaka <aa...@apache.org> on 2021/01/26 00:33:11 UTC

[CVE-2020-9492] Apache Hadoop Potential privilege escalation

CVE-2020-9492. Apache Hadoop Potential privilege escalation

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, 2.0.0-alpha to 2.10.0

Description:
WebHDFS client might send SPNEGO authorization header to remote URL
without proper verification. A crafty user can trigger services to
send server credentials to a webhdfs path for capturing the service
principal.

Mitigation:
Users of the affected versions should apply either of the following mitigations:
- Set different http signature secrets and use dedicated hosts for
each privileged impersonation service (such as HiveServer2).
- Upgrade to 3.3.0, 3.2.2, 3.1.4, 2.10.1, or newer with TLS encryption
enabled and configure dfs.http.policy to HTTPS_ONLY.

Credit:
This issue was discovered by Kevin Risden.

---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@hadoop.apache.org
For additional commands, e-mail: general-help@hadoop.apache.org