Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-2192

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-24 Jan, 2014 | 18:00
Updated At-06 Aug, 2024 | 15:27
Rejected At-
Credits

The RPC protocol implementation in Apache Hadoop 2.x before 2.0.6-alpha, 0.23.x before 0.23.9, and 1.x before 1.2.1, when the Kerberos security features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information by forcing a downgrade to simple authentication.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:24 Jan, 2014 | 18:00
Updated At:06 Aug, 2024 | 15:27
Rejected At:
▼CVE Numbering Authority (CNA)

The RPC protocol implementation in Apache Hadoop 2.x before 2.0.6-alpha, 0.23.x before 0.23.9, and 1.x before 1.2.1, when the Kerberos security features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information by forcing a downgrade to simple authentication.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://rhn.redhat.com/errata/RHSA-2014-0037.html
vendor-advisory
x_refsource_REDHAT
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-0400.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/57915
third-party-advisory
x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2013/Aug/251
mailing-list
x_refsource_FULLDISC
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0037.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0400.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/57915
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://seclists.org/fulldisclosure/2013/Aug/251
Resource:
mailing-list
x_refsource_FULLDISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://rhn.redhat.com/errata/RHSA-2014-0037.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
x_refsource_CONFIRM
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-0400.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/57915
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://seclists.org/fulldisclosure/2013/Aug/251
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0037.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0400.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/57915
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2013/Aug/251
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:24 Jan, 2014 | 18:55
Updated At:11 Apr, 2025 | 00:51

The RPC protocol implementation in Apache Hadoop 2.x before 2.0.6-alpha, 0.23.x before 0.23.9, and 1.x before 1.2.1, when the Kerberos security features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information by forcing a downgrade to simple authentication.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.03.2LOW
AV:A/AC:H/Au:N/C:P/I:P/A:N
Type: Primary
Version: 2.0
Base score: 3.2
Base severity: LOW
Vector:
AV:A/AC:H/Au:N/C:P/I:P/A:N
CPE Matches

The Apache Software Foundation
apache
>>hadoop>>0.23.0
cpe:2.3:a:apache:hadoop:0.23.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.1
cpe:2.3:a:apache:hadoop:0.23.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.3
cpe:2.3:a:apache:hadoop:0.23.3:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.4
cpe:2.3:a:apache:hadoop:0.23.4:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.5
cpe:2.3:a:apache:hadoop:0.23.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.6
cpe:2.3:a:apache:hadoop:0.23.6:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.7
cpe:2.3:a:apache:hadoop:0.23.7:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>0.23.8
cpe:2.3:a:apache:hadoop:0.23.8:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.0.0
cpe:2.3:a:apache:hadoop:1.0.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.0.1
cpe:2.3:a:apache:hadoop:1.0.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.0.2
cpe:2.3:a:apache:hadoop:1.0.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.0.3
cpe:2.3:a:apache:hadoop:1.0.3:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.0.4
cpe:2.3:a:apache:hadoop:1.0.4:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.1.0
cpe:2.3:a:apache:hadoop:1.1.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.1.1
cpe:2.3:a:apache:hadoop:1.1.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.1.2
cpe:2.3:a:apache:hadoop:1.1.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>1.2.0
cpe:2.3:a:apache:hadoop:1.2.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>2.0.0
cpe:2.3:a:apache:hadoop:2.0.0:alpha:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>2.0.1
cpe:2.3:a:apache:hadoop:2.0.1:alpha:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>2.0.2
cpe:2.3:a:apache:hadoop:2.0.2:alpha:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>2.0.3
cpe:2.3:a:apache:hadoop:2.0.3:alpha:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>2.0.4
cpe:2.3:a:apache:hadoop:2.0.4:alpha:*:*:*:*:*:*
The Apache Software Foundation
apache
>>hadoop>>2.0.5
cpe:2.3:a:apache:hadoop:2.0.5:alpha:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://rhn.redhat.com/errata/RHSA-2014-0037.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2014-0400.htmlsecalert@redhat.com
N/A
http://seclists.org/fulldisclosure/2013/Aug/251secalert@redhat.com
N/A
http://secunia.com/advisories/57915secalert@redhat.com
N/A
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2014-0037.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2014-0400.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://seclists.org/fulldisclosure/2013/Aug/251af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/57915af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0037.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0400.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2013/Aug/251
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/57915
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0037.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0400.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://seclists.org/fulldisclosure/2013/Aug/251
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/57915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2018-1286
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.44%
||
7 Day CHG~0.00%
Published-28 Feb, 2018 | 18:00
Updated-16 Sep, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache OpenMeetings 3.0.0 - 4.0.1, CRUD operations on privileged users are not password protected allowing an authenticated attacker to deny service for privileged users.

Action-Not Available
Vendor-The Apache Software Foundation
Product-openmeetingsApache OpenMeetings
CWE ID-CWE-287
Improper Authentication
CVE-2018-11770
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-4.2||MEDIUM
EPSS-87.70% / 99.43%
||
7 Day CHG~0.00%
Published-13 Aug, 2018 | 00:00
Updated-05 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.

Action-Not Available
Vendor-The Apache Software Foundation
Product-sparkApache Spark
CWE ID-CWE-287
Improper Authentication
CVE-2007-5797
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.71% / 71.29%
||
7 Day CHG~0.00%
Published-03 Nov, 2007 | 00:00
Updated-07 Aug, 2024 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-geronimon/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-5085
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.66% / 70.01%
||
7 Day CHG~0.00%
Published-26 Sep, 2007 | 10:00
Updated-07 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain "access to Geronimo internals" via unspecified vectors.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-geronimon/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-4548
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-0.75% / 72.09%
||
7 Day CHG~0.00%
Published-27 Aug, 2007 | 23:00
Updated-17 Sep, 2024 | 01:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-geronimon/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-17523
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-88.77% / 99.49%
||
7 Day CHG~0.00%
Published-03 Feb, 2021 | 16:55
Updated-04 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-shiroApache Shiro
CWE ID-CWE-287
Improper Authentication
CVE-2020-17510
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-1.02% / 76.32%
||
7 Day CHG~0.00%
Published-05 Nov, 2020 | 20:17
Updated-04 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/Linux
Product-shirodebian_linuxApache Shiro
CWE ID-CWE-287
Improper Authentication
CVE-2012-0803
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.67% / 70.42%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-cxfn/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-5351
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.31% / 53.56%
||
7 Day CHG~0.00%
Published-09 Oct, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack," a different vulnerability than CVE-2012-4418.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-axis2n/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-3467
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.16% / 77.70%
||
7 Day CHG~0.00%
Published-27 Aug, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-qpidn/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-5063
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.96% / 82.75%
||
7 Day CHG~0.00%
Published-14 Jan, 2012 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-tomcatn/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-3620
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.98% / 85.99%
||
7 Day CHG~0.00%
Published-03 May, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-qpidn/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-9803
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.34% / 56.12%
||
7 Day CHG~0.00%
Published-18 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider). Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster. The vulnerability is fixed from Apache Solr 6.6.1 onwards.

Action-Not Available
Vendor-The Apache Software Foundation
Product-solrApache Solr
CWE ID-CWE-287
Improper Authentication
CVE-2023-34340
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 27.24%
||
7 Day CHG~0.00%
Published-21 Jun, 2023 | 07:01
Updated-09 Oct, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Accumulo: Accumulo 2.1.0 may incorrectly validate cached credentials

Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo. This issue affects Apache Accumulo: 2.1.0. Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided. Users are advised to upgrade to 2.1.1.

Action-Not Available
Vendor-The Apache Software Foundation
Product-accumuloApache Accumuloaccumulo
CWE ID-CWE-287
Improper Authentication
CVE-2023-25601
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-4.3||MEDIUM
EPSS-0.06% / 18.11%
||
7 Day CHG~0.00%
Published-20 Apr, 2023 | 15:07
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache DolphinScheduler 3.0.0 to 3.1.1 python gateway has improper authentication

On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.

Action-Not Available
Vendor-The Apache Software Foundation
Product-dolphinschedulerApache DolphinScheduler
CWE ID-CWE-287
Improper Authentication
CVE-2024-27137
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 6.98%
||
7 Day CHG~0.00%
Published-04 Feb, 2025 | 10:19
Updated-14 Jul, 2025 | 12:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Cassandra: unrestricted deserialization of JMX authentication credentials

In Apache Cassandra it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorized operations. This is same vulnerability that CVE-2020-13946 was issued for, but the Java option was changed in JDK10. This issue affects Apache Cassandra from 4.0.2 through 5.0.2 running Java 11. Operators are recommended to upgrade to a release equal to or later than 4.0.15, 4.1.8, or 5.0.3 which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-cassandraApache Cassandra
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • Next
Details not found