First published: Thu Mar 23 2017(Updated: )
The JobHistory Server in Cloudera CDH 4.x before 4.6.0 and 5.x before 5.0.0 Beta 2, when using MRv2/YARN with HTTP authentication, allows remote authenticated users to obtain sensitive job information by leveraging failure to enforce job ACLs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudera Hadoop | =4.0.0 | |
Cloudera Hadoop | =4.0.1 | |
Cloudera Hadoop | =4.1.0 | |
Cloudera Hadoop | =4.1.1 | |
Cloudera Hadoop | =4.1.2 | |
Cloudera Hadoop | =4.1.3 | |
Cloudera Hadoop | =4.1.4 | |
Cloudera Hadoop | =4.1.5 | |
Cloudera Hadoop | =4.2.0 | |
Cloudera Hadoop | =4.2.1 | |
Cloudera Hadoop | =4.2.2 | |
Cloudera Hadoop | =4.3.0 | |
Cloudera Hadoop | =4.3.1 | |
Cloudera Hadoop | =4.3.2 | |
Cloudera Hadoop | =4.4.0 | |
Cloudera Hadoop | =4.5.0 | |
Cloudera Hadoop | =5.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6446 has a medium severity rating due to its potential exposure of sensitive job information.
To fix CVE-2013-6446, upgrade Cloudera CDH to version 4.6.0 or later.
CVE-2013-6446 affects Cloudera CDH versions 4.x before 4.6.0 and 5.x before 5.0.0 Beta 2.
CVE-2013-6446 allows remote authenticated users to access sensitive job information due to a failure to enforce job ACLs.
Yes, CVE-2013-6446 is related to authentication issues in the JobHistory Server when using MRv2/YARN with HTTP authentication.