Filtered by vendor Cloudera
Subscribe
Total
51 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-9271 | 1 Cloudera | 1 Cloudera Manager | 2019-12-05 | 3.5 LOW | 5.4 MEDIUM |
Cloudera Manager 5.7.x before 5.7.6, 5.8.x before 5.8.4, and 5.9.x before 5.9.1 allows XSS in the help search feature. | |||||
CVE-2016-3192 | 1 Cloudera | 1 Cloudera Manager | 2019-12-04 | 4.0 MEDIUM | 6.5 MEDIUM |
Cloudera Manager 5.x before 5.7.1 places Sensitive Data in cleartext Readable Files. | |||||
CVE-2017-7399 | 1 Cloudera | 1 Cloudera Manager | 2019-12-04 | 6.5 MEDIUM | 8.8 HIGH |
Cloudera Manager 5.8.x before 5.8.5, 5.9.x before 5.9.2, and 5.10.x before 5.10.1 allows a read-only Cloudera Manager user to discover the usernames of other users and elevate the privileges of those users. | |||||
CVE-2015-6495 | 1 Cloudera | 1 Cloudera Manager | 2019-12-03 | 5.0 MEDIUM | 7.5 HIGH |
There is Sensitive Information in Cloudera Manager before 5.4.6 Diagnostic Support Bundles. | |||||
CVE-2015-4457 | 1 Cloudera | 1 Cloudera Manager | 2019-12-02 | 3.5 LOW | 5.4 MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the Cloudera Manager UI before 5.4.3 allow remote authenticated users to inject arbitrary web script or HTML using unspecified vectors. | |||||
CVE-2017-15536 | 1 Cloudera | 1 Data Science Workbench | 2019-10-02 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.x before 1.2.0. Several web application vulnerabilities allow malicious authenticated users of CDSW to escalate privileges in CDSW. CDSW users can exploit these vulnerabilities in combination to gain root access to CDSW nodes, gain access to the CDSW database which includes Kerberos keytabs of CDSW users and bcrypt hashed passwords, and gain access to other privileged information such as session tokens, invitation tokens, and environment variables. | |||||
CVE-2018-11744 | 1 Cloudera | 1 Cloudera Manager | 2019-07-18 | 6.8 MEDIUM | 8.1 HIGH |
Cloudera Manager through 5.15 has Incorrect Access Control. | |||||
CVE-2017-9327 | 1 Cloudera | 1 Cloudera Manager | 2019-07-11 | 4.0 MEDIUM | 6.5 MEDIUM |
Secret data of processes managed by CM is not secured by file permissions. | |||||
CVE-2017-9326 | 1 Cloudera | 1 Cloudera Manager | 2019-07-11 | 3.5 LOW | 7.5 HIGH |
The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed. | |||||
CVE-2017-9325 | 1 Cloudera | 1 Cdh | 2019-07-11 | 6.4 MEDIUM | 7.5 HIGH |
The provided secure solrconfig.xml sample configuration does not enforce Sentry authorization on /update/json/docs. | |||||
CVE-2018-15665 | 1 Cloudera | 1 Data Science Workbench | 2019-06-21 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.2.x through 1.4.0. Unauthenticated users can get a list of user accounts. | |||||
CVE-2018-6185 | 1 Cloudera | 2 Cloudera Manager, Navigator Key Trustee Kms | 2019-06-11 | 5.5 MEDIUM | 4.9 MEDIUM |
In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data. | |||||
CVE-2018-20091 | 1 Cloudera | 1 Data Science Workbench | 2019-06-10 | 6.5 MEDIUM | 9.9 CRITICAL |
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs. | |||||
CVE-2018-5798 | 1 Cloudera | 1 Cloudera Manager | 2019-06-10 | 4.3 MEDIUM | 6.1 MEDIUM |
This CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager. | |||||
CVE-2018-10815 | 1 Cloudera | 1 Cloudera Manager | 2019-05-28 | 4.0 MEDIUM | 6.5 MEDIUM |
An issue was discovered in Cloudera Manager before 5.13.4, 5.14.x before 5.14.4, and 5.15.x before 5.15.1. A read-only user can access sensitive cluster information. | |||||
CVE-2014-0220 | 1 Cloudera | 1 Cloudera Manager | 2018-10-09 | 4.0 MEDIUM | N/A |
Cloudera Manager before 4.8.3 and 5.x before 5.0.1 allows remote authenticated users to obtain sensitive configuration information via the API. | |||||
CVE-2015-8094 | 1 Cloudera | 1 Hue | 2018-07-02 | 5.8 MEDIUM | 6.1 MEDIUM |
Open redirect vulnerability in Cloudera HUE before 3.10.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the next parameter. | |||||
CVE-2012-2230 | 1 Cloudera | 2 Cloudera Manager, Cloudera Service And Configuration Manager | 2017-12-19 | 6.5 MEDIUM | N/A |
Cloudera Manager 3.7.x before 3.7.5 and Service and Configuration Manager 3.5, when Kerberos is not enabled, does not properly install taskcontroller.cfg, which allows remote authenticated users to impersonate arbitrary user accounts via unspecified vectors, a different vulnerability than CVE-2012-1574. | |||||
CVE-2016-6605 | 1 Cloudera | 1 Cdh | 2017-04-14 | 5.0 MEDIUM | 7.5 HIGH |
Impala in CDH 5.2.0 through 5.7.2 and 5.8.0 allows remote attackers to bypass Setry authorization. | |||||
CVE-2015-2263 | 1 Cloudera | 1 Cloudera Manager | 2017-03-29 | 2.1 LOW | 3.3 LOW |
Cloudera Manager 4.x, 5.0.x before 5.0.6, 5.1.x before 5.1.5, 5.2.x before 5.2.5, and 5.3.x before 5.3.3 uses global read permissions for files in its configuration directory when starting YARN NodeManager, which allows local users to obtain sensitive information by reading the files, as demonstrated by yarn.keytab or ssl-server.xml in /var/run/cloudera-scm-agent/process. |