|
Message-ID: <8f894e4f-533f-07e1-085e-06f41106ac0d@apache.org> Date: Wed, 27 Mar 2019 13:05:04 -0400 From: Josh Elser <elserj@...che.org> To: oss-security@...ts.openwall.com Subject: [CVE-2019-0212] Apache HBase REST Server incorrect user authorization CVE-2019-0212: HBase REST Server incorrect user authorization Description: In all previously released Apache HBase 2.x versions, authorization was incorrectly applied to users of the HBase REST server. Requests sent to the HBase REST server were executed with the permissions of the REST server itself, not with the permissions of the end-user. This issue is only relevant when HBase is configured with Kerberos authentication, HBase authorization is enabled, and the REST server is configured with SPNEGO authentication. This issue does not extend beyond the HBase REST server. Versions affected: 2.0.0-2.0.4, 2.1.0-2.1.3 Mitigation: Stop the HBase REST server until your installation is upgraded to HBase 2.0.5, 2.1.4, or any other later release. Upon upgrading to a newer version, no other action is required. Credit: This issue was discovered by Gaurav Kanade - The Apache HBase PMC
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.