Show filters
50 Total Results
Displaying 21-30 of 50
Sort by:
Attacker Value
Unknown

CVE-2018-11744

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
Cloudera Manager through 5.15 has Incorrect Access Control.
0
Attacker Value
Unknown

CVE-2017-9327

Disclosure Date: July 03, 2019 (last updated November 27, 2024)
Secret data of processes managed by CM is not secured by file permissions.
0
Attacker Value
Unknown

CVE-2017-9325

Disclosure Date: July 03, 2019 (last updated November 27, 2024)
The provided secure solrconfig.xml sample configuration does not enforce Sentry authorization on /update/json/docs.
0
Attacker Value
Unknown

CVE-2017-9326

Disclosure Date: July 03, 2019 (last updated November 27, 2024)
The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed.
0
Attacker Value
Unknown

CVE-2018-11215

Disclosure Date: July 03, 2019 (last updated November 27, 2024)
Remote code execution is possible in Cloudera Data Science Workbench version 1.3.0 and prior releases via unspecified attack vectors.
0
Attacker Value
Unknown

CVE-2018-15665

Disclosure Date: June 21, 2019 (last updated November 27, 2024)
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.2.x through 1.4.0. Unauthenticated users can get a list of user accounts.
0
Attacker Value
Unknown

CVE-2018-15913

Disclosure Date: June 20, 2019 (last updated November 27, 2024)
An issue was discovered in Cloudera Manager 5.x through 5.15.0. One type of page in Cloudera Manager uses a 'returnUrl' parameter to redirect the user to another page in Cloudera Manager once a wizard is completed. The validity of this parameter was not checked. As a result, the user could be automatically redirected to an attacker's external site or perform a malicious JavaScript function that results in cross-site scripting (XSS). This was fixed by not allowing any value in the returnUrl parameter with patterns such as http://, https://, //, or javascript. The only exceptions to this rule are the SAML Login/Logout URLs, which remain supported since they are explicitly configured and they are not passed via the returnUrl parameter.
Attacker Value
Unknown

CVE-2018-20091

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.
0
Attacker Value
Unknown

CVE-2018-5798

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
This CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager.
0
Attacker Value
Unknown

CVE-2018-6185

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.
0