Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8f894e4f-533f-07e1-085e-06f41106ac0d@apache.org>
Date: Wed, 27 Mar 2019 13:05:04 -0400
From: Josh Elser <elserj@...che.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2019-0212] Apache HBase REST Server incorrect user authorization

CVE-2019-0212: HBase REST Server incorrect user authorization

Description: In all previously released Apache HBase 2.x versions, 
authorization was incorrectly applied to users of the HBase REST server. 
Requests sent to the HBase REST server were executed with the 
permissions of the REST server itself, not with the permissions of the 
end-user. This issue is only relevant when HBase is configured with 
Kerberos authentication, HBase authorization is enabled, and the REST 
server is configured with SPNEGO authentication. This issue does not 
extend beyond the HBase REST server.

Versions affected: 2.0.0-2.0.4, 2.1.0-2.1.3

Mitigation: Stop the HBase REST server until your installation is 
upgraded to HBase 2.0.5, 2.1.4, or any other later release. Upon 
upgrading to a newer version, no other action is required.

Credit: This issue was discovered by Gaurav Kanade

- The Apache HBase PMC

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.